3.1 Potential Risks To Data And Personal Information When Information Is Transmitted And Stored Digitally
3.2.1. There are 4 ris. to data and information:
1. Unauthorized Access - Access to networks by users who are not permitted to access them is called unauthorized access. 2. Deliberate Damage By Malware - Malware can show messages, play sounds, delete files and reprogram systems to perform tasks that will harm the system and the connected hardware. 3. Accidental Deletion - Users can delete files or an entire context in a drive by mistake. 4. Theft Of Personal Data - 1.Phishing - Involves sending large number of messages that appear to be from real organizations. These emails ask the user to enter their credentials. 2.Pharming - Criminals create fake versions of trusted websites to trick users into entering their credentials. 3.2.2. There are 16 methods of securing data online: 1. Firewalls - Control data in and out of a network. 2. Encryption - Uses a key to scramble data into an unreadable format. 3. Passwords, PINs & Biometrics - used to authenticate a user so that they can access an online system. 4. CAPCHA Tests- Used to make sure that data is entered by a human not by a Bot. 5. Anti-Malware: 1.Anti-Virus - They check files that are downloaded and loaded by a computer for signs of virus definitions. 2.Anti-Adware - Detects, Quarantines and removes the adware. 3.Anti-Spyware - Detects, Quarantines and removes the adware. 6. Access Rights & File Permissions - Permissions are set for access to files, folders or drives allowing users to read only or read and write to the file. 7. Secure Websites . . HTTPS . . 8. Email Attachments and Web links - Be careful when opening email attachments and web links. 9. Backup Procedures - Backups create one or more copies of data. There are 3 types of backups; Full Backup, Incremental Backup, Differential Backup.