Вы находитесь на странице: 1из 3

BTEC 2012

Unit 1 The Online World

Name: .

Lesson 12 Possible Threats to Data

(Student Book C Pg 1 - 4)

Starter What is malware?

A hostile and annoying piece of software

Malicious Threats




Threats to data


1. Explain what each of the following threats are:

a. Opportunist
People who find an unattended computer, (where a user has still been logged on) and use it wo view,
steal or damage information, programs and hardware
b. Viruses
A piece of code that is capable of copying itself and attaching itself to files. It will generally corrupt and/or
delete data.
c. Phishing
A threat that will attempt to steal passwords, finance details and other Personal information
2. What is considered accidental damage?
Accidental damage is when damage is caused by accident, such as damage caused by a natural
disaster (i.e. a flood or earthquake damage), mischievous acts or a mishap that might cause a computer
to lose all stored data.


BTEC 2012
Unit 1 The Online World

Name: .

Computer security is an important aspect of online communication however all computer systems are
under continuous threat of attack and the threats are ever changing. It is impossible to provide 100%
protection to a computer system.
3. What are the possible consequences of an attack?
Loss of files/data
Loss of control over documents
Identity theft and credentials taken.
Computer crashing
4. It is important to protect computer systems and their data. Match the following preventative actions to
the correct description.
Physical Barrier


Access Levels

Anti-virus Software



This is set up to intercept computer viruses before they can

become resident on the computer. The software can isolate
the virus, remove it and sometimes repair any damage.
These can be set up to allow individuals to have access to
only specific levels of an application and to prevent
unauthorized users from accessing particular data.
This is used to codify data so that it cannot be read by
anyone who does not have the key to the code. An
algorithm, sometimes known as a cipher, is applied to the
data at the transmission end and the reverse is applied at
the reception end.
This is a piece of software that monitors all data arriving at
your computer from the internet and all data leaving your
computer. It stops anything that it thinks is harmful or
unwanted (such as viruses, spam, Trojan horses and
These include turning off computers and locking offices
when the systems are unattended to prevent damage by
people, the environment (e.g. fire, flooding, electrical
interference) or theft.
Sequences of characters, known onlyto the computer user, which
allow access to a computer, network or application

Backup and recovery. Making a backup of data is the only way of recovering from a total data
disaster. Many individuals and organizations back up data to Flash solid state storage devices
or magnetic tape at night. The tapes are stored safely in a separate place, so that they are not
destroyed by any disaster, which could destroy the master system (fire, earthquake, etc.).
5. What are the different types of backups available?


BTEC 2012
Unit 1 The Online World

Name: .

Full system backup, Operating system backup, Removable device backup (where you backup data to
items such as a USB).
The dangers of identity theft and of revealing too much personal information on
social networks and via instant messaging are often reported in the news.
These threats can affect both your security and your reputation. Think about who has access
to the information you put online. Before you put photos on your social networking profile,
think about who might see them and whether you would mind. You might not want your
employer or teacher to see something that might be embarrassing or harmful to your
Use security settings to protect your privacy and identity. Remember that not everyone is who
they claim to be. Criminals access social networking sites trying to find out information about
people. This may put you at risk of identity theft and password theft if you have revealed too
much information about yourself. Be careful not to reveal information that you might use in a
password, such as your pets name.
6. What is identity theft?
The usage of taking someones name and credentials to gain access to things such as, subscriptions,
loans e.c.t
7. How can you help prevent identify theft?
Not sharing information with anyone, Make sure that you have antivirus/antispyware software running,
Secure sensitive information and completely destroy any sensitive information that you nolonger need.
(Whether you burn it or shred it, (If youre going to shred it, use a cross shredder)).