Professional Documents
Culture Documents
Lesson 12 - Possible Threats To Data
Lesson 12 - Possible Threats To Data
Malicious Threats
opportunist
op
po
rtu
Virus
ni
st
Threats to data
Trojan
Phishing
A.Silver
BTEC 2012
Unit 1 The Online World
Computer security is an important aspect of online communication however all computer systems are
under continuous threat of attack and the threats are ever changing. It is impossible to provide 100%
protection to a computer system.
3. What are the possible consequences of an attack?
a. Organizations
It trades online have to build up a reputation for being a secure organization with secure network access.
If this reputation is damaged, potential customers might be put off, costing the business money.
b. Secrets
When an organizations secrets are spread to competitors or to the wider public,
any particular advantage the organization has will be lost. An example is when an
organization has been doing research on a new product, and the results of that research find their way to
a competitor.
c. Identity
Identity theft could cause problems with obtaining loans and other contractual agreements.
d. Disclosure
Disclosure of information could cause legal problems. A company can be sued by
its customers if it sells their personal information or fails to protect it properly.
4. It is important to protect computer systems and their data. Match the following preventative
actions to the correct description.
Physical Barrier
Passwords
Access Levels
Anti-virus Software
Firewall
Encryption
A.Silver
BTEC 2012
Unit 1 The Online World
Backup and recovery. Making a backup of data is the only way of recovering from a total data
disaster. Many individuals and organizations back up data to Flash solid state storage devices
or magnetic tape at night. The tapes are stored safely in a separate place, so that they are not
destroyed by any disaster, which could destroy the master system (fire, earthquake, etc.).
A.Silver