Impact and danger of IT
Liechti, Jan (2022)
Liechti, Jan
2022
All rights reserved. This publication is copyrighted. You may download, display and print it for Your own personal use. Commercial use is prohibited.
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:amk-202205128904
https://urn.fi/URN:NBN:fi:amk-202205128904
Tiivistelmä
The thesis sought to analyze the impact and danger IT can have for general Users, companies, and governments. Its main idea was to show how a regular IT user can be the beginning of a war when using IT incautiously. There was no client who commissioned the thesis but myself.
Three main questions are answered: What are the threats for regular IT users? What are the threats for companies or governments regarding IT? How can this lead to war?
To do that there are more theoretical parts than practical parts. Theoretical parts include the different threats for regular IT users and companies/governments as well as how this can lead to war. The practical parts include a flowchart to find out whether a suspicious email, SMS, phone call or website is a threat or not and a fictive scenario to demonstrate how an IT incident with a regular user can lead to war.
The analyses point that a scenario where a regular user causes a huge incident is not impossible.
There are also a lot of threats due to IT. Based on the analyses it is suggested that responsible persons take care of this threats. Because if this is not done it can cause a lot of costs and problems for various organizations.
Three main questions are answered: What are the threats for regular IT users? What are the threats for companies or governments regarding IT? How can this lead to war?
To do that there are more theoretical parts than practical parts. Theoretical parts include the different threats for regular IT users and companies/governments as well as how this can lead to war. The practical parts include a flowchart to find out whether a suspicious email, SMS, phone call or website is a threat or not and a fictive scenario to demonstrate how an IT incident with a regular user can lead to war.
The analyses point that a scenario where a regular user causes a huge incident is not impossible.
There are also a lot of threats due to IT. Based on the analyses it is suggested that responsible persons take care of this threats. Because if this is not done it can cause a lot of costs and problems for various organizations.