Вы находитесь на странице: 1из 3

BTEC 2012

Unit 1 The Online World

Name: .

Lesson 12 Possible Threats to Data


(Student Book C Pg 1 - 4)

Starter What is malware?


A hostile, intrusive or annoying piece of software or program code.

Malicious Threats

Opportuni
st

Virus

Threats to data

Trojan

Phishing

1. Explain what each of the following threats are:


a. Opportunist
People who find an unattended computer which has been left logged in to in to a system may
view, steel or damage information.
b. Viruses
A program that has been created to damage a computer network.
c. Phishing
The attempt to gain access to passwords and financial details by pretending to be emails from
trusted websites.
2. What is considered accidental damage?
This can be caused by natural disasters such as flooding leading to loss of data.

A.Silver

BTEC 2012
Unit 1 The Online World

Name: .

Computer security is an important aspect of online communication however all computer


systems are under continuous threat of attack and the threats are ever changing. It is
impossible to provide 100% protection to a computer system.
3. What are the possible consequences of an attack?
a.
A company losing all their data therefore losing their clients
b.
Identity theft
c.
Private info shared

4. It is important to protect computer systems and their data. Match the following preventative
actions to the correct description.
Physical Barrier

Passwords

Access Levels

Anti-virus Software

Firewall

Encryption

This is set up to intercept computer viruses before they can


become resident on the computer. The software can isolate
the virus, remove it and sometimes repair any damage.
These can be set up to allow individuals to have
access to only specific levels of an application and
to prevent unauthorized users from accessing
particular data.
This is used to codify data so that it cannot be read by
anyone who does not have the key to the code. An
algorithm, sometimes known as a cipher, is applied to the
data at the transmission end and the reverse is applied at
the reception end.
This is a piece of software that monitors all data arriving at
your computer from the internet and all data leaving your
computer. It stops anything that it thinks is harmful or
unwanted (such as viruses, spam, Trojan horses and
hackers).
These include turning off computers and locking
offices when the systems are unattended to prevent
damage by people, the environment (e.g. fire,
flooding, electrical interference) or theft.
Sequences of characters, known onlyto the computer user,
which allow access to a computer, network or application

Backup and recovery. Making a backup of data is the only way of recovering from a
total data disaster. Many individuals and organizations back up data to Flash solid
state storage devices or magnetic tape at night. The tapes are stored safely in a

A.Silver

BTEC 2012
Unit 1 The Online World

Name: .

separate place, so that they are not destroyed by any disaster, which could destroy
the master system (fire, earthquake, etc.).
5. What are the different types of backups available?
Full Back Up
Incremental Back Up
Differential Back Up
The dangers of identity theft and of revealing too much personal information on
social networks and via instant messaging are often reported in the news.
These threats can affect both your security and your reputation. Think about who has
access to the information you put online. Before you put photos on your social
networking profile, think about who might see them and whether you would mind.
You might not want your employer or teacher to see something that might be
embarrassing or harmful to your reputation.
Use security settings to protect your privacy and identity. Remember that not
everyone is who they claim to be. Criminals access social networking sites trying to
find out information about people. This may put you at risk of identity theft and
password theft if you have revealed too much information about yourself. Be careful
not to reveal information that you might use in a password, such as your pets name.
6. What is identity theft?
It is when somebody uses your name and information like credit card on the internet.
7. How can you help prevent identify theft?
Do not give out private information

Plenary What is the Data Protection Act?


It is the law against processing data on identifiable living people.

A.Silver

Вам также может понравиться