Sunteți pe pagina 1din 4

BTEC 2012

Unit 1 The Online World

Name:Aidan

Lesson 12 Possible Threats to Data


(Student Book C Pg 1 - 4)

Starter What is malware?

Software which is specifically designed to disrupt or damage a computer


system

Malicious Threats

Opportunist
O
pp
or
tu

Virus
ni
st

Threats to data

Trojan

Phishing

1. Explain what each of the following threats are:


a. Opportunist

A person who takes advantage of opportunities like stealing a laptop left on


someones table.
b. Viruses

A computer virus is a program or piece of code that is loaded onto your computer
without your knowledge and runs itself.
c. Phishing

Phishing is the attempt to acquire sensitive information such as usernames,


passwords, and credit card details (and sometimes, indirectly, money) by
masquerading as a trustworthy entity in an electronic communication.
2. What is considered accidental damage?

Accidental damage is damage that occurs suddenly as a result of an unexpected


and non-deliberate external action.

A.Silver

BTEC 2012
Unit 1 The Online World

Name:Aidan

Computer security is an important aspect of online communication however all computer systems are
under continuous threat of attack and the threats are ever changing. It is impossible to provide 100%
protection to a computer system.
3. What are the possible consequences of an attack?
A.

Personal security data can be stolen and use by a fraud to access data pretending
to be you.
B.

...................................

C.

...................................

D.

...................................

4. It is important to protect computer systems and their data. Match the following preventative
actions to the correct description.
Physical Barrier
Passwords

Access Levels

Anti-virus
Software

Firewall

Encryption

This is set up to intercept computer viruses before they can


become resident on the computer. The software can isolate
the virus, remove it and sometimes repair any damage.
These can be set up to allow individuals to have
access to only specific levels of an application and
to prevent unauthorized users from accessing
particular data.
This is used to codify data so that it cannot be read by
anyone who does not have the key to the code. An
algorithm, sometimes known as a cipher, is applied to the
data at the transmission end and the reverse is applied at
the reception end.
This is a piece of software that monitors all data arriving at
your computer from the internet and all data leaving your
computer. It stops anything that it thinks is harmful or
unwanted (such as viruses, spam, Trojan horses and
hackers).
These include turning off computers and locking
offices when the systems are unattended to
prevent damage by people, the environment (e.g.
fire, flooding, electrical interference) or theft.
Sequences of characters, known only to the computer user,
which allow access to a computer, network or application

A.Silver

BTEC 2012
Unit 1 The Online World

Name:Aidan

Backup and recovery. Making a backup of data is the only way of recovering from a total data
disaster. Many individuals and organizations back up data to flash solid state storage devices
or magnetic tape at night. The tapes are stored safely in a separate place, so that they are not
destroyed by any disaster, which could destroy the master system (fire, earthquake, etc.).

5. What are the different types of backups available?

...................................

...................................
The dangers of identity theft and of revealing too much personal information on
social networks and via instant messaging are often reported in the news.
These threats can affect both your security and your reputation. Think about who has access
to the information you put online. Before you put photos on your social networking profile,
think about who might see them and whether you would mind. You might not want your
employer or teacher to see something that might be embarrassing or harmful to your
reputation.
Use security settings to protect your privacy and identity. Remember that not everyone is who
they claim to be. Criminals access social networking sites trying to find out information about
people. This may put you at risk of identity theft and password theft if you have revealed too
much information about yourself. Be careful not to reveal information that you might use in a
password, such as your pets name.
6. What is identity theft?

...................................
7. How can you help prevent identify theft?

...................................

..

Plenary What is the Data Protection Act?


The Data Protection Act controls how your personal information is used by
organizations, businesses or the government.
Everyone responsible for using data has to follow strict rules called data protection
principles. They must make sure the information is:
- Accurate.
- Used fairly and lawfully.
- Used for limited, specifically stated purposes.
- Used in a way that is adequate, relevant and not excessive.
- Kept for no longer than is absolutely necessary.
- Handled according to peoples data protection rights.
3

A.Silver

BTEC 2012
Unit 1 The Online World
-

Name:Aidan

Kept safe and secure.


Not transferred outside the UK without adequate protection.

A.Silver

S-ar putea să vă placă și