Sie sind auf Seite 1von 4

BTEC 2012

.
Unit 1 The Online World

Name:

Lesson 12 Possible Threats to Data


(Student Book C Pg 1 - 4)

Starter What is malware?


Examples of malware include: computer worms (essentially a
computer virus which does not need to attach itself to a ! le or message); Trojan
horses, which appear as some benign program allowing a hacker full access to a
system; spyware; adware; and various other nastiest. Malware is never been

Malicious Threats

Opportunist
O
pp
or
tu

Virus
ni
st

Threats to data

Trojan

Phishing

1. Explain what each of the following threats are:


a. Opportunist
Opportunist threats. People who ! nd an unattended computer which has been
left logged in to a system may view, steal or damage information, programs or even
hardware.
b. Viruses
c. Phishing
This is a type of threat which attempts to gain access to passwords,
! menial details and other such privileged information. Often this is done by email
Messages pretending to come from trusted websites, instant messaging or social
Networks. Normally they try to divert you to a website which looks original and which
Asks for information about you.
2. What is considered accidental damage?
Lenovo trained technicians and Lenovo Qualified parts reduce the need for re-repair
Single, up front investment enables accurate prediction of yearly system repair costs
Comprehensive diagnostic tools identify hidden damage that may have otherwise gone untreated
IT departments don't have to purchase and manage spare parts inventory
28-80% savings relative to the cost of repair or a new system (depending on machine and repair type)
If repair is not possible, the entire system will be replaced at no additional charge2
If you are entitled to Onsite Warranty, your Accidental Damage Protection claim may be repaired at
your location4

A.Silver

BTEC 2012
.
Unit 1 The Online World

Name:

Computer security is an important aspect of online communication however all computer systems are
under continuous threat of attack and the threats are ever changing. It is impossible to provide 100%
protection to a computer system.
3. What are the possible consequences of an attack?
a.
Organizations which trade online have to build up a reputation for being a secure
Organization with secure network access. If this reputation is damaged, potential
Customers might be put off, costing the business money.
b.
When an organizations secrets are spread to competitors or to the wider public,
any particular advantage the organization has will be lost. An example is when an
organization has been doing research on a new product, and the results of that
research ! and their way to a competitor
d. Disclosure of information could cause legal problems. A company can be sued by
its customers if it sells their personal information or fails to protect it properly. The
obligations of organizations to protect customers data are covered by the Data
Protection Act (1998). Organizations that store peoples personal information have
to register with the Information Commissioners Of! ce (ICO) and must undertake to
treat the information responsibly.

...................................

4. It is important to protect computer systems and their data. Match the following preventative
actions to the correct description.
Physical Barrier
Passwords

Access Levels

Anti-virus Software

Firewall

Encryption

This is set up to intercept computer viruses before they can


become resident on the computer. The software can isolate
the virus, remove it and sometimes repair any damage.
These can be set up to allow individuals to have access to
only specific levels of an application and to prevent
unauthorized users from accessing particular data.
This is used to codify data so that it cannot be read by
anyone who does not have the key to the code. An
algorithm, sometimes known as a cipher, is applied to the
data at the transmission end and the reverse is applied at
the reception end.
This is a piece of software that monitors all data arriving at
your computer from the internet and all data leaving your
computer. It stops anything that it thinks is harmful or
unwanted (such as viruses, spam, Trojan horses and
hackers).
These include turning off computers and locking offices
when the systems are unattended to prevent damage by
people, the environment (e.g. fire, flooding, electrical
interference) or theft.
Sequences of characters, known onlyto the computer user, which
allow access to a computer, network or application

A.Silver

BTEC 2012
.
Unit 1 The Online World

Name:

Backup and recovery. Making a backup of data is the only way of recovering from a total data
disaster. Many individuals and organizations back up data to Flash solid state storage devices
or magnetic tape at night. The tapes are stored safely in a separate place, so that they are not
destroyed by any disaster, which could destroy the master system (fire, earthquake, etc.).

5. What are the different types of backups available?


Full backup is a method of backup where all the files and folders selected for the backup will be
backed up. When subsequent backups are run, the entire list of files and will be backed up
again. The advantage of this backup is restores are fast and easy as the complete list of files
are stored each time. The disadvantage is that each backup run is time consuming as the entire
list of files is copied again. Also, full backups take up a lot more storage space when compared
to incremental or differential backups
The dangers of identity theft and of revealing too much personal information on
social networks and via instant messaging are often reported in the news.
These threats can affect both your security and your reputation. Think about who has access
to the information you put online. Before you put photos on your social networking profile,
think about who might see them and whether you would mind. You might not want your
employer or teacher to see something that might be embarrassing or harmful to your
reputation.
Use security settings to protect your privacy and identity. Remember that not everyone is who
they claim to be. Criminals access social networking sites trying to find out information about
people. This may put you at risk of identity theft and password theft if you have revealed too
much information about yourself. Be careful not to reveal information that you might use in a
password, such as your pets name.
6.
7.
8.
9.

What is identity theft?


The dangers of identity theft and of revealing too much personal information on
social networks and via instant messaging are often reported in the news.
How can you help prevent identify theft?

These threats can affect both your security and your reputation. Think about who
has access to the information you put online. Before you put photos on your social
networking pro! le, think about who might see them and whether you would mind.
You might not want your employer or teacher to see something that might be
embarrassing or harmful to your reputation.
Use security settings to protect your privacy and identity. Remember that not everyone
is who they claim to be. Criminals access social networking sites trying to ! nd out
information about people. This may put you at risk of identity theft and password theft
if you have revealed too much information about yourself. Be careful not to reveal
information that you might use in a password, such as your pets name

Plenary What is the Data Protection Act?


The Data Protection Act controls how your personal information is used by
organizations, businesses or the government.
Everyone who is responsible for using data has to follow strict rules called data
protection principles. They must make sure the information is:
used fairly and lawfully
used for limited, specifically stated purposes
used in a way that is adequate, relevant and not excessive
accurate
kept for no longer than is absolutely necessary
handled according to peoples data protection rights

A.Silver

BTEC 2012
.
Unit 1 The Online World

Name:

kept safe and secure


not transferred outside the UK without adequate protection

A.Silver

Das könnte Ihnen auch gefallen