You are on page 1of 1

Topic 3: Operating Online

3.1 Potential Risks To Data And Personal Information When Information Is Transmitted And Stored
Digitally

3.2.1. There are 4 ris. to data and information:


1. Unauthorized Access - Access to networks by users who are not
permitted to access them is called unauthorized access.
2. Deliberate Damage By Malware - Malware can show messages,
play sounds, delete files and reprogram systems to perform tasks that will harm the
system and the connected hardware.
3. Accidental Deletion - Users can delete files or an entire context
in a drive by mistake.
4. Theft Of Personal Data -
1.Phishing - Involves sending large number of messages that appear to be from real
organizations. These emails ask the user to enter their credentials.
2.Pharming - Criminals create fake versions of trusted websites to trick users into entering
their credentials.
3.2.2. There are 16 methods of securing data online:
1. Firewalls - Control data in and out of a network.
2. Encryption - Uses a key to scramble data into an unreadable format.
3. Passwords, PINs & Biometrics - used to authenticate a user so that they can access an online
system.
4. CAPCHA Tests- Used to make sure that data is entered by a human not by a Bot.
5. Anti-Malware:
1.Anti-Virus - They check files that are downloaded and loaded by a computer for signs of
virus definitions.
2.Anti-Adware - Detects, Quarantines and removes the adware.
3.Anti-Spyware - Detects, Quarantines and removes the adware.
6. Access Rights & File Permissions - Permissions are set for access to files, folders or drives
allowing users to read only or read and write to the file.
7. Secure Websites . . HTTPS . .
8. Email Attachments and Web links - Be careful when opening email attachments and web
links.
9. Backup Procedures - Backups create one or more copies of data. There
are 3 types of backups; Full Backup, Incremental Backup, Differential Backup.

Page 18 of 42

You might also like