Professional Documents
Culture Documents
Name: .
Malicious Threats
Opportunist
Virus
Threats to data
Trojan
Phishing
A.Silver
BTEC 2012
Unit 1 The Online World
Name: .
4. It is important to protect computer systems and their data. Match the following
preventative actions to the correct description.
Physical Barrier
1.
Passwords
2.
Access Levels
3.
Anti-virus Software
4.
Firewall
5.
Encryption 6.
Backup and recovery. Making a backup of data is the only way of recovering
from a total data disaster. Many individuals and organizations back up data to
Flash solid state storage devices or magnetic tape at night. The tapes are stored
2
A.Silver
BTEC 2012
Unit 1 The Online World
Name: .
safely in a separate place, so that they are not destroyed by any disaster, which
could destroy the master system (fire, earthquake, etc.).
5. What are the different types of backups available?
A.Silver