Zusammenfassung der Ressource
Threats to Data
- Idnetity Theft
- When someone steals your
personal data and uses them to
pretend to be you to get credit,
apply for documents etc.
- Malware
- A hostile, intrusive
or annoying piece
of software or
program
- Opportunist Threats
- People who find
an unattended
computer and try
to view or steal
what they can
- Hacking
- Unauthorised access to
computer data with or
without malicious internet
- Phishing
- Sending fake emails asking
users to input password and
security information in a bid to
steal money
- Accidental Damage
- Natural Disaster,
Mischief or Accidental
damage
- Physical Barriers
- Locking workstations,
offices etc.
- Password Control
- Password conventions
to ensure they are
strong, regular forced
changing
- Back up and Recovery
- Storing a safe copy of the
data, reugularly updated
and away from the
original. Can do full back
up or incrimental back up.
- Access levels
- Set to allow individuals to
access only a specific
level of an application.
- Encryption
- Data is coded so that
only the person with
the key can unlock
the code
- Firewall
- This monitors data
arriving at the computer
and leaving and stops
anything unwanted.
- Anti-Virus Software
- Set up to intercept
computer viruses before
they do any damage . Can
isolate viruses, remove
and sometimes repair