Piggybacking Threats

2477 Words5 Pages

[Type a caption for your photo]
About this brochure
The brochure will help a person to identify the different types of threats to an IT system. The brochure will provide a detailed and informative guide on the following threats
• Potential threats
• malicious damage
• counterfeit goods
• Threats to e-commerce. Who We Are
About Us
Technology R Us are an I.T support company that provide hardware and software support to numerous businesses. Technology R Us has recently taken part on a charity campaign where they support new businesses in Africa and Asia with their e-commerce journey.

Contact Us
Phone: [Telephone]
Email: [Email address]
Web: [Web address]

R
[Address]
[City, ST ZIP Code]

The impact of potential threats …show more content…

Organizations can be affected by this as data can be stolen through phishing e-mails or spyware and fraudsters can impersonate an organization. This can cause major problems for customers as there is a risk of theft when purchasing items through e-commerce websites. It can create legal issues as the organization can be accused of stealing without being aware identity theft has been committed.
Piggybacking
Piggybacking is when a person uses an internet connection that belongs to someone else. The internet access often does not belong to the person piggybacking. Piggybacking is a form of malicious damage that can be legal in some areas. Piggybacking often does no harm to a person or an organization. Some people often piggyback if they cannot afford an internet connection or do not have an internet connection where they are situated. Often Piggybacking can happen by accident as wireless devices can connect to Wi-Fi routers very easily.
Piggybacking can less likely be used to commit illegal activities such as identity theft or downloading illegal content from the internet. This can be a potential and malicious threat to organizations as they can be punished for allowing the actions to take place on their internet …show more content…

Often people can purchase copied versions of DVDs and music through peer-to-peer sales for very low prices. This means that copied versions of music and films can be bought publicly through illegal sellers. Copied DVDs and Music can also be downloaded from the internet for free through piracy websites Counterfeit goods can lead to loss of business or income through customers. This because the products can be found at affordable prices or can be free through piracy websites.
Counterfeit goods: Software and Games
Software and games can also be counterfeit goods. Games can be illegally copied and sold or distributed through the internet, car boot sales, peer-to-peer networks and in person sales.
Copyright Act 1988
The copyright Act 1988 is a law that prevents items to be copied and sold. This law allows manufacturers to continue creating their products with the reduced worry of sales being lost through counterfeit goods. Any counterfeit goods being sold will resort to punishment through either a fine or imprisonment and ceasing of goods.
Method of distribution: in person

Open Document