Académique Documents
Professionnel Documents
Culture Documents
Name: .
Malicious Threats
Worm
Trojan
Virus
O
pp
or
tu
ni
st
Threats to data
Phishing
People who find an unattended computer may steal, view or damage information, programs or
hardware.
b. Viruses
Virus is a malware program that when executed replicates itself by inserting copies of itself into other
computer programs
c. Phishing
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card
details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic
communication.
2. What is considered accidental damage?
Accidental damage is damage done without the knowledge of the person that did it, e.g. If the person
has a Virus on his USB without his knowledge and he then plugs his USB into another computer
transferring the virus onto the computer.
A.Silver
BTEC 2012
Unit 1 The Online World
Name: .
Computer security is an important aspect of online communication however all computer systems are
under continuous threat of attack and the threats are ever changing. It is impossible to provide 100%
protection to a computer system.
3. What are the possible consequences of an attack?
a. Loss of data
b. Details stolen (password, username, credit card detail.)
c. Damage to the hardware
d. Overloading of a system
4. It is important to protect computer systems and their data. Match the following preventative actions to
the correct description.
Physical Barrier
Passwords
Access Levels
Anti-virus Software
Firewall
Encryption
Backup and recovery. Making a backup of data is the only way of recovering from a total data
disaster. Many individuals and organizations back up data to Flash solid state storage devices
or magnetic tape at night. The tapes are stored safely in a separate place, so that they are not
destroyed by any disaster, which could destroy the master system (fire, earthquake, etc.).
5. What are the different types of backups available?
There are three different types of back up: normal, incremental and differential.
A.Silver
BTEC 2012
Unit 1 The Online World
Name: .
The dangers of identity theft and of revealing too much personal information on
social networks and via instant messaging are often reported in the news.
These threats can affect both your security and your reputation. Think about who has access
to the information you put online. Before you put photos on your social networking profile,
think about who might see them and whether you would mind. You might not want your
employer or teacher to see something that might be embarrassing or harmful to your
reputation.
Use security settings to protect your privacy and identity. Remember that not everyone is who
they claim to be. Criminals access social networking sites trying to find out information about
people. This may put you at risk of identity theft and password theft if you have revealed too
much information about yourself. Be careful not to reveal information that you might use in a
password, such as your pets name.
6. What is identity theft?
Using another person's name and personal information in order to obtain credit, loans, e
7. How can you help prevent identify theft?
To prevent identity theft, do not give out personal information to anyone no matter who they
claim to be as they not be the person they claim to be.
Plenary What is the Data Protection Act?
The Data Protection Act is a law designed to protect personal stored on computers or in an
organised paper filing system.
A.Silver