Zusammenfassung der Ressource
Security issues (ICT GCSE) by Roxy
- Bluejacking is the process of sending unwanted
messages to open Bluetooth connection.
- Kee Bluetooth switched off when not in use.
- Keep Bluetooth switched off when not in use.i
- Physical threats such as theft, flooding, fire and accidental damage.
- Keep computers in locked rooms and back up the data.
- Hackers try to get acces without permission.
- Use firewalls, passwords and encrypt the information traveling across networks.
- Phishing 'cons' people into believing that an email or text is from a valid organization so that they give away their username and password leading to
identity theft.
- You need to be able to identify phishing.
- Unsecure wireless networks let other users easily see and use your wireless network.
- Secure wireless networks using a password and encrypt data traveling over the network.
- Storing passwords and other important information in cookies makes it easier for others to gain access to your accounts lots of damage during the system.
- Know how to delete and manage cookies using options in the browser.
- Viruses are designed to be harmful to digital diviaces and to spread easily over networks.
- Keep Bluetooth switched of when not in use.