Topic 25


How data can be destroyed

Data can be destroyed  by:

  • Equipment malfunction
  • Equipment destruction
  • User error
1 of 6

How to protect data from accidental destruction

Data can be protected from accidental destruction

  • Train users- so they are less likely to make mistakes
  • Ensure backup copies are kept- as data can be recovered from backups if lost
  • Thoroughly test software- to avoid system crashes which can lose data
2 of 6

How to protect data from deliberate destruction

  • Use a firewall to prevent hackers- a firewall can be hardware, software, or both
  • To protect against disgruntled employees destroying data- ensure you have carefully selected staff and if they leave they should not be allowed to work their notice
  • Virus attack- install virus checking software and scan regularly for viruses
3 of 6

Firewalls and virus scanning software

Firewalls look at data coming in from the Internet, if it is allowable, they let it through, if not it is rejected. 

Virus scanning software checks system for viruses and should be used regularly. Do not open email file attachments unless you know who they are from and never load illegal games/ software/ music as these often contain viruses. 

4 of 6

Protecting data from unauthorised access

  • Use usernames (user-ID's) and passwords
  • Use encryption when data is stored or transmitted (e.g. over the Internet) 
  • Users must remember to log off when away from their computer

Physical methods: 

  • Keypads to gain access to rooms
  • Biometric access to rooms and computers using fingerprinting and retinal scanning
5 of 6


Encryption scrambles data before sending or storing it. It is used when banking or credit card details are sent over the Internet. If data is intercepted or stolen, it cannot be understood. 

6 of 6


No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Data Protection Issues resources »