Escolar Documentos
Profissional Documentos
Cultura Documentos
2012
Unit 1 The Online World
Name: .
Malicious Threats
Virus
O
Threats to data
Trojan
Phishing
b. Viruses
A computer virus is a piece of program code that makes copies of itself by attaching itself to a file or
attachment. The virus can sometimes destroy or change files.
c. Phishing
Phishing is a form of Internet fraud where criminals aim to steal valuable information such as credit
cards, social security numbers, user IDs and passwords for bank accounts.
A.Silver
BTEC 2012
Unit 1 The Online World
Name: .
Computer security is an important aspect of online communication however all computer systems are
under continuous threat of attack and the threats are ever changing. It is impossible to provide 100%
protection to a computer system.
3. What are the possible consequences of an attack?
a.
Important files could be changed or even deleted which cannot be recovered and will lead to future
implications if lost or tampered with
b.
Credit cards and other confidential information could be accessed and used to the benefit of the attacker
and could affect you immediately financially.
c.
Computers could be hacked and taken control of and files could be accessed
4. It is important to protect computer systems and their data. Match the following preventative actions to
the correct description.
Physical Barrier
Passwords
Access Levels
Anti-virus Software
Firewall
Encryption
Backup and recovery. Making a backup of data is the only way of recovering from a total data
disaster. Many individuals and organizations back up data to flash solid state storage devices
or magnetic tape at night. The tapes are stored safely in a separate place, so that they are not
A.Silver
BTEC 2012
Unit 1 The Online World
Name: .
destroyed by any disaster, which could destroy the master system (fire, earthquake, etc.).
5. What are the different types of backups available?
Floppy Disks, Tapes, CD-R,CD-RW, USBs, Cloud storage
The dangers of identity theft and of revealing too much personal information on
social networks and via instant messaging are often reported in the news.
These threats can affect both your security and your reputation. Think about who has access
to the information you put online. Before you put photos on your social networking profile,
think about who might see them and whether you would mind. You might not want your
employer or teacher to see something that might be embarrassing or harmful to your
reputation.
Use security settings to protect your privacy and identity. Remember that not everyone is who
they claim to be. Criminals access social networking sites trying to find out information about
people. This may put you at risk of identity theft and password theft if you have revealed too
much information about yourself. Be careful not to reveal information that you might use in a
password, such as your pets name.
6. What is identity theft?
The fraudulent practice of using another person's name and personal information to try and obtain
credit, loans, etc.
.
...................................
7. How can you help prevent identify theft?
Choose strong passwords: This is particularly important for the extra verification services used on
some websites
Stay secure: Before entering payment details online check the link is secure
Set privacy settings: Make sure that it is not possible for the public at large to view personal
information about yourself online or on social networking
sites
...................................
..
A.Silver