Using a computer to intentionally commit a crime, e.g. stealing data or money
Hacking
Gaining unauthorised access to a computer with the intention of corrupting or stealing data
Malware
Malicious software that is unintentionally downloaded onto a computer by a user
Malware can enter the network through browsing the internet, opening email attachments, via a USB storage device, etc.
Malware can store itself automatically on a computer hard drive as a hidden file
Malware can be activated when a certain program is opened or when a predetermined condition is met, e.g. a certain date
Spamming
Sending junk emails to users, for example adverts for products
Phishing
Sending emails that, when opened, appear to be from a reliable source asking the user to update their personal information. This information is then used by hackers for the purpose of identity theft.
Data encryption
The process of scrambling data using a key before it is transmitted onto a network
Data encryption
Makes the data unreadable or meaningless if intercepted
Users with the encryption key software can unscramble the data when it arrives at its destination
Usernames and passwords
Users on a network are allocated a unique user ID and a randomly generated password
Users are required to change passwords regularly by the network software to enhance security
Each time a user logs on, the system checks their user ID and password against a database of user details
Network software can disable the user ID for a period of time after unsuccessful log-on attempts
Access levels
Users are allocated different levels of access to files
Access rights can be classified as read only, read and copy or read and write
Access rights are stored in a table linked to the user ID and password
Backup
A copy of the data that can be loaded or restored on to the system if the original data is lost or corrupted
Network backups are usually automatically scheduled to run at certain times, e.g. the end of each day
Firewall
A piece of software or hardware that monitors and controls data entering or leaving a network
Uses security settings to block data that does not comply with the organisation's rules
Protocols
Agreed standards or rules for sending or receiving data on a network
Protocols are agreed by hardware manufacturers and software developers
Protocols used for data transfer
File transport protocol (FTP)
Hypertext transfer protocol (HTTP)
Hypertext transfer protocol secure (HTTPS)
File transport protocol (FTP)
Allows users to download or upload files over the internet
Hypertext transfer protocol (HTTP)
A protocol used by the World Wide Web to transfer webpages over the internet
Sends a command on behalf of the user to the web server so request a webpage
If a webpage cannot be located the HTTP will report an error, e.g. 406 File Not Found
Hypertext transfer protocol secure (HTTPS)
Uses a secure socket layer (SSL) to ensure data is transmitted securely over the internet
Uses encryption for sending data and decryption for receiving data
Web browsers display a padlock icon on screen to show that the web page currently in use is secure
The main use of this protocol is in financial applications, e.g. online PayPal transactions