IT revision, pages 50-57 (text book)

?

IT revision pages 50-57

Protecting data and information

The characteristics of threats to data:

  • Using obvious passwords such as your D.O.B
  • Sharing passwords with others
  • Leaving devices unlocked
  • Using the same log-in details on different accounts
  • Using personal devices for business operations
  • Not having appropriate anti-malware software
  • Posting sensitive information online

Viruses and other malware:

Viruses and other malware can have various effects on people devices and lives. For instance, it may mean that data is stolen or deleted, personal information may be taken which can lead to a loss in money and reputation (if a business). Viruses can occur when downloading dangerous software, of handing out personal details on insecure websites. Also, some people's emails or hardware may be infected and could pass to your devices.

Hackers:

Hacking is when unauthorised users will attempt to gain access to your devices without physically being on them. Hackers can steal files and personal data, often hackers may work in groups or individually. Ethical hackers, however, are employed by businesses to test their security systems and spot weaknesses. Users can reduce the chance of hacking if they download appropriate security features such as firewalls and anti-virus software. 

Phishing:

Phishing is when users will email or contact you pretending to be your bank or another company in an attempt for users to give up personal data about themselves or download malicious software. However, there are ways in which users can ensure they avoid phishing.For example:

  • If they are redirected to a website and it is not secure and it is named as a bank then this is false.
  • Banks will never ask for usernames, passwords and bank details over emails.
  • If the URL which is sent to you doesn't describe what the email says the link is for then it will not be going to say Lloyds website. 
  • If the email contains spelling errors then it will not be legitimate.
  • The email seems unrealistic or untrue
  • You didn't authorise any actions or payments
  • The email says you've won contests you haven't entered
  • Asks you to send money
  • Contains suspicious links/files

Ransomware:

This is when users will steal personal information and files in regard to someone and demand they pay them in order to have their data returned to them. Some people may take control of people's computer screens and make threats regarding exposure etc. To prevent this, users should ensure they have backed up all important data, established firewalls and other security features. 

Accidental damage:

People may lose files accidently, a common form of data loss. This can be through not saving or backing up work. Or devices may crash leaving work deleted and unsaved. There are however cautions to users to prevent work being lost through not saving data. For instance, a warning will appear if work hasn't been saved, computers that are turning off but still have applications open may send a message to users asking whether they want to log off.

The impacts of threats to data, information and systems

Comments

No comments have yet been made