You are on page 1of 2

Friday 27th February 2015 Unit 1

Definition list
Ella Jade Mawdsley

Opportunist threats
Someone is left logged on to a system, someone else then goes over to that computer to find that
someone else is already logged in and they plug a dangerous pen drive that could make the network
breakdown.

Computer viruses
an infective agent that typically consists of a nucleic acid molecule in a protein coat, is too small to
be seen by light microscopy, and is able to multiply only within the living cells of a host.
an infection or disease caused by a virus.
a harmful or corrupting influence.
"the virus of cruelty that is latent in all human beings"
2 a piece of code which is capable of copying itself and typically has a detrimental effect, such as
corrupting the system or destroying data.

Malware
Software that is designed to disrupt your computer and gain access to private information. It could
be a Trojan, worm or virus.

Phishing
People create a fake bank account emai9l and get you to insert your details that you use to open
your bank account online and they then get all your information that they want to use to get your
money.

Accidental damage
When you do something that could lead to the computer breaking down and the fan over heating.

Data protection act


Your data should bhe kept secure.
Your data should be accurate.
Your data should be fairly and lawfully processed.

Processed for limited purposes.

Preventative measures for data protection


Archiving of information
Staff training
System security implementation

You might also like