Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 1

Herrera, Dianna S.

ITEC 100

BSInfoTech 401-A 03/11/2023

Data Security

 Process or preventing unauthorized access, theft, leakage, change or destruction of

digital data.

 Protecting files, databases and accounts.

 It prevents third third parties that could manipulate data.

 A protection in securing data.

Possible ways to prevent Cyber attack

 Stay alert and avoid clicking on a suspicious link.

 Think before you click

Recent issues about Cyber attack

 Tether - a cryptocurrency that attempts to maintain a value peg to an underlying

currency such as the dollar or euro.

Example is the:

Celebrity couple Mikee Quintos and Paul Salas called for the representatives of

cryptocurrency group Cronus Holdings Corporation to reach out to their clients. The

celebrity couple and the seven others filed a syndicated estafa case against the company

for allegedly scamming them out of P8 million.

You might also like