Professional Documents
Culture Documents
6 Security
6.1 Security threats purposes. If someone else knows it they can
Data security pretend to be you.
1. These are the two reasons why this data is 2. Typically teachers, administrative staff and
valuable to the company: students will be authorised to access a school
computer system. Sometimes parents also have
● The data represents an investment. It has
access.
taken time, effort and resources to create the
data. 3. Crime is deliberate, and typically done for
personal gain. Malpractice is poor use of the
● The data has value because it can be used to
computer system by accident or because of not
make a new product that can be sold to make
knowing the right thing to do.
a profit.
4. Software downloaded from the Internet can
2. The company has personal and financial
contain hidden malware.
data about employees. This could be used
by criminals. It has personal value to the
Online attacks
employees. The data must be kept safely so
the employees are paid correctly. For all these 1. A DoS attack overloads the system with many
reasons it should be kept private, safe and requests for access.
secure. 2. Pharming is pretending to be a respectable
3. Looking at someone else’s emails without website from a reliable company. People may
permission is a data privacy issue. input personal data because they trust the
company, but the website is a trick. Criminals
4. Changing a test result on a computer system is a
will take someone’s identifying details and use
data integrity issue.
them to impersonate that person online (this is
identity theft).
Security threats
3. The email might not be from the bank. The
1. Hardware faults: The computer might be
person on the other end of the line might be
poorly made. Someone might break it by
a criminal hoping to get your identifying
accident. There could be a fault in secondary
details.
storage or data transmission to and from the
computer. 4. The Internet is extremely useful and beneficial
for a business. It can be used to find information,
Software faults: There might be errors in the
to buy and sell, and to market products and
application software or in the operating system.
services. With proper precautions the online risks
2. To protect the file, you could: can be avoided.
● take a backup
● provide guidance and training for employees 6.2 Security protection
about how to treat equipment with care Proof of identity
● test equipment and software before use. 1. There are many valid answers: for example to get
3. There are many correct answers. There could be money out of a bank account, to log on to a social
designated areas for eating and drinking which media account such as Facebook or Twitter.
are well away from the computer. 2. You can make a password harder to guess by
4. There are many correct answers, depending using unusual words, or unusual combinations
on local conditions. Some places are affected of words, letters and other characters.
by different types of bad weather, earthquakes, 3. Two physical characteristics that might be used
flooding, power cuts, etc. for biometric identity checks: fingerprint, retinal
scan.
Malpractice and crime 4. Advantages of biometric checks are that there
1. You shouldn’t you tell anyone else your password is nothing to lose or forget and the results are
because it is used to identify you for security difficult to steal or fake. The disadvantage is that