Professional Documents
Culture Documents
Malicious Threats
Opportunist
Virus
Threats to data
Trojan
Phishing
b. Viruses
Viruses are small programs which can replicate themselves and spread from computer to computer. They
are never beneficial; they usually make changes to the system. They arrive by attaching themselves to
files or email messages.
c. Phishing
This is a type of threat which attempts to gain access to passwords, financial details and other such privileged
information. Often this is done by email messages pretending to come from trusted websites, instant messaging or
social networks. Normally they try to divert you to a website which looks original and which asks for information
about you.
A.Silver
BTEC 2012
Unit 1 The Online World
4. It is important to protect computer systems and their data. Match the following preventative
actions to the correct description.
Physical Barrier
Passwords
Access Levels
Anti-virus Software
Firewall
Encryption
A.Silver
BTEC 2012
Unit 1 The Online World
Backup and recovery. Making a backup of data is the only way of recovering from a total data
disaster. Many individuals and organizations back up data to Flash solid state storage devices
or magnetic tape at night. The tapes are stored safely in a separate place, so that they are not
destroyed by any disaster, which could destroy the master system (fire, earthquake, etc.).
5. What are the different types of backups available?
Full system backup.
Incremental backup of files or data that has been changed since the last full backup.
Backups to removable media for example USB, CD,DVD etc.
The dangers of identity theft and of revealing too much personal information on
social networks and via instant messaging are often reported in the news.
These threats can affect both your security and your reputation. Think about who has access
to the information you put online. Before you put photos on your social networking profile,
think about who might see them and whether you would mind. You might not want your
employer or teacher to see something that might be embarrassing or harmful to your
reputation.
Use security settings to protect your privacy and identity. Remember that not everyone is who
they claim to be. Criminals access social networking sites trying to find out information about
people. This may put you at risk of identity theft and password theft if you have revealed too
much information about yourself. Be careful not to reveal information that you might use in a
password, such as your pets name.
6. What is identity theft?
...................................
...................................
A.Silver