IT revision, pages 25-27

HideShow resource information
What is malware?
This is software designed to cause harm to your IT system, such as deleting, altering or stealing data.
1 of 24
What are hackers?
A user who exploits weaknesses in IT systems in order to gain unauthorised access is known as a hacker. This can be done to steal, alter or delete data.
2 of 24
What is an ethical hacker?
Someone who is a lawful hacker, they're employed by businesses to try and find weaknesses in their IT systems and networks so they can improve it.
3 of 24
What is phishing?
A person who pretends to be representing large companies such as your bank or businesses such as Amazon in an attempt to gain your personal information.
4 of 24
What is meant by accidental damage?
This can often be caused through human error such as failure to save work properly or spilling substances on devices.
5 of 24
What can all of the previous malware do to individuals?
Can lead to identity theft or bank fraud.
6 of 24
What is identity fraud?
When someone steals someone else's personal information to open bank accounts, obtain loans, take out mobile phone contracts etc.
7 of 24
What is bank fraud?
When a criminal user gains access to your bank account and uses it to withdraw cash and purchase items.
8 of 24
What can phishing etc do to businesses?
It can impact their reputation (due to people not trusting the business) and could result in a loss of income (due to fines and theft of business money).
9 of 24
How can you protect your data, devices and systems?
File permission and access levels, Backup and recovery procedures, Passwords, Protocols, Digital certificates, Physical access control.
10 of 24
How do digital certificates protect data?
It allows secure data transfer using public key encryption.
11 of 24
How do protocols protect data?
They define data transfer processes to ensure secure transfer.
12 of 24
What is antivirus software?
It detects and removes viruses and other malware from a computer system.
13 of 24
What are firewalls?
They monitor network traffic in and out of an IT system. They block suspicious traffic to prevent unauthorised access.
14 of 24
What is encryption?
The conversion of data into an unreadable code known as cipher text. It can only be read with the encryption key.
15 of 24
How do we encrypt stored and transmitted data?
We encrypt our hard disks so even if someone gained access to the system they would not be able to read the contents. We also encrypt data while it is being transmitted so that if it is intercepted it cannot be read.
16 of 24
What is the Data Protection Act?
It is a piece of legislation which protects peoples personal data held by others. It ensures the privacy and proper use of peoples data and gives rights to individuals on what data is collected and how it is used.
17 of 24
How does the DPA impact on businesses?
It increases the costs to meet requirements for data security. Limited in how much data can be gathered and how its used. Fines of up to £500,000 if the act is breached by businesses.
18 of 24
How does the DPA impact individuals?
Personal data collected by others is more likely to be kept secure and not be misused. Compensation can be claimed for any harm caused due to misuse of an individuals data.
19 of 24
What is the Computer Misuse Act of 1990?
It protects against attacks on IT systems used to gain unauthorised access and steal or cause damage to data. It also covers threats like hacking and spreading malware.
20 of 24
How does the Computer Misuse Act implicate businesses?
Organisations' computer systems are more secure due to the deterrent of legal punishments for attacks on systems. It requires organisations to develop and adhere to effective security policies.
21 of 24
How does the Computer Misuse Act implicate individuals?
Provides protection from attacks to a persons computer systems. Those who carry out attacks can face unlimited fines and up to 10 years in prison.
22 of 24
What are codes of practise?
They're not legal requirements like the DPA however they're encouraged in businesses.
23 of 24
What do codes of practise aim to do?
Help support compliance with the DPA and computer misuse act and other legislation. Ensure data is not mishandled which would lead to a bad reputation. Give individuals confidence that the data they supply to organisations will be safe.
24 of 24

Other cards in this set

Card 2

Front

What are hackers?

Back

A user who exploits weaknesses in IT systems in order to gain unauthorised access is known as a hacker. This can be done to steal, alter or delete data.

Card 3

Front

What is an ethical hacker?

Back

Preview of the front of card 3

Card 4

Front

What is phishing?

Back

Preview of the front of card 4

Card 5

Front

What is meant by accidental damage?

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Systems and Software resources »