Unit 1 The Online
World
Learning Aim C
Name: Palminder Sanghera
Form: 11 BBH
Lesson 1 Possible Threats to Data
(Student Book C Pg. 1 - 4)
Starter What is malware?
Malware is software which is made to disrupt or damage a system
Malicious Threats
Threats to data
Opportunist Virus
Threats to data
Opportunist
Trojan Phishing
1 Explain what each of the following threats are:
a. Opportunist
An opportunist is a person who takes action on every opportunity given.
Threatening opportunists in IT are people who may find faults in code, and take
information from a program.
b. Viruses
A virus is a piece of code which is capable of copying itself and typically
has a detrimental effect, such as corrupting the system or destroying
data.
c. Phishing
Sending emails, appearing to be known companies asking for card and bank
details.
2 What is considered accidental damage?
Accidental damage is when something happens to your online document by
accident, for example deleting documents.
Computer security is an important aspect of online communication however all computer systems are
under continuous threat of attack and the threats are ever changing. It is impossible to provide 100%
protection to a computer system.
3 What are the possible consequences of an attack?
If your computer is hacked, valuable information can be stolen, privacy can be deprived, money can
be stolen due to personal bank information available on your computer and many companies may
have to replace their computers to avoid hackers.
4 It is important to protect computer systems and their data. Match the following preventative
actions to the correct description.
Physical Barrier This is set up to intercept computer viruses before they can
Become resident on the computer. The software can isolate
The virus, remove it and sometimes repair any damage.
Passwords These can be set up to allow individuals to have access to
only specific levels of an application and to prevent
unauthorized users from accessing particular data.
Access Levels This is used to codify data so that it cannot be read by
Anyone who does not have the key to the code. An
algorithm, sometimes known as a cipher, is applied to the
data at the transmission end and the reverse is applied at
The reception end.
Anti-virus Software This is a piece of software that monitors all data arriving at
your computer from the internet and all data leaving your
Computer. It stops anything that it thinks is harmful or
unwanted (such as viruses, spam, Trojan horses and
Hackers).
Firewall These include turning off computers and locking offices
when the systems are unattended to prevent damage by
people, the environment (e.g. fire, flooding, electrical
interference) or theft.
Encryption Sequences of characters, known onlyto the computer user, which
allow access to a computer, network or application
Backup and recovery.
Making a backup of data is the only way of recovering from a total data disaster. Many
individuals and organizations back up data to flash solid state storage devices or magnetic tape
at night. The tapes are stored safely in a separate place, so that they are not destroyed by any
disaster, which could destroy the master system (fire, earthquake, etc.).
5 What are the different types of backups available?
Mirror Backup
Offsite Backup
Local Backup
Differential Backup
Full Backup
Cloud Backup
FTP Backup
The dangers of identity theft and of revealing too much personal information on
Social networks and via instant messaging are often reported in the news.
These threats can affect both your security and your reputation. Think about who has access
to the information you put online. Before you put photos on your social networking profile,
think about who might see them and whether you would mind. You might not want your
employer or teacher to see something that might be embarrassing or harmful to your
reputation.
Use security settings to protect your privacy and identity. Remember that not everyone is who
they claim to be. Criminals access social networking sites trying to find out information about
people. This may put you at risk of identity theft and password theft if you have revealed too
much information about yourself. Be careful not to reveal information that you might use in a
password, such as your pets name.
6 What is identity theft?
A practice of fraud, where you use another persons name/details/credit to take out money or loans.
7 How can you help prevent identify theft?
Create strong password
Beware of SPAM or phishing
Dont overshare on social media
8 What is the Data Protection Act?
The Data Protection Act 1998 (DPA) is an Act of Parliament of the United Kingdom of Great
Britain and Northern Ireland which defines UK law on the processing of data on identifiable
living people. It is the main piece of legislation that governs the protection of
personal data in the UK.