Operating online

Subdecks (6)

Cards (82)

  • Risk to data and information
    • Unauthorised access
    • Accidental deletion
    • Deliberate damage by malware
    • Theft of personal data
  • Unauthorised Access
    Acesss to networks by users who are not permitted to acces them is called UNAUTHORISED ACCESS
    Unauthorised users can attemt to gain acces to networks directly by themsleves
    The can create mnay softwares and run them on the device that they atn to access,by inputting many login details which can cause them to attempt to gain access to network with poor security
  • Deliberat damage by malware
    Malware can play sounds,delte files/ reprogram systems t oerrma tasks that weill Hrm the system and the connected hardware of the system
  • What is malware?
    Malware is malicious software tha is created with the intention to do harm the softwares within the device
  • Name a diferent type of malware that is used to harm a users device and access to software or resources within the device 

    Ransomeware
    Ransomeware threatens to delete uses foles or place restrictions to softwares or resources within the UNTIL MONEY IS PAID
    The money is usually sent to an ANONYMOUS ACCOUNT
    Messages sent by the hacker is usuall distesssing to the user and impements mental presure on them so they immediatel pay the money without cautious thought
  • Wha is meant by accdiental deleition
    Software or personal data files and documents can be lost from the device accidently by the user
  • Name 3 ways in which a deivces software can be lost through ACCIDENTAL DELETION
    1. Press a key on a keyboard by accident
    2. Format media on the wrong storage device
    3. Their device loses power unexpectantly
  • Name ways in which persnal data can be stolen
    • Phishing
    • pharming
  • Explain how phishing causes devices to be at risk of data theft
    Involves eendign large portions of messages that apeal to be from real organisations
    The user is tricked into inputtign their personal details such as their personal information ( name, location date of birth, contact information)
  • Examples of sources being sent to a user increases risk of phishing
    • Direct messages from unknown numbers/contacts
    • Emails pretending to be from real organisations/ shops/ banks/ Charities
    • Following hyperlinks to open a webpage in which the user is asked to type their personal detail
  • Spear phishing
    Phishing messages arehighly cutomised or personalised and targetted at a smaller number or particular users
  • Phishing messages can also be sent to mobile devices 

    Phishing messages can be sent via SMS/DIRECT MESSAGES
    Users can open a webpage in a mobile browser
    Users mat not realise that the webpage is fake/ particularly if they have never seen the comapy;s real wbapge on a MOBILE BROWSER
    usr reveals their perosna lfrmation by typing in their:

    USERNAME
    PASSWORDS
  • Pharming
    Pharming. creates fake versiosn of websites. webpages that are commonly known.
    The user is lead to click the website that is pretending to be from a legitmate website
    Tricks users into thinking that it is a real website and leads the user to insert their personal information.
  • What is the main aim of pharming?
    • Pharming aims to divert user traffic to malicious site by sending a website that seems to be legitimate to facilitate data theft
  • Give the two methods in which pharming can be done
    • Interent traffic
    • URL is designed to be very similar to the URL OF THE REAL WEBSITE
    • A user can accidently misspelt the website that they are typing leading to a pharming website - personal data is shared with the criminal/hacker
  • State methods in which personal data is protected and secured
    • Firewalls
    • Encryption
    • Password. pins and biometrics
    • CAPTCHA TESTS
    • Antimalware
    • Secure websites
    • Email attachments
    • Backup procedures
    • Onlien thrid pary payment processors