Define Hacking
Gaining unauthorised access to data/computer system
Define Virus
a program which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data
Define Trojan
a program designed to breach the security of a computer system while ostensibly performing some innocuous function
Define Worm
a standalone malware computer program that replicates itself in order to spread to other computers
Define Spyware
software that enables a user to obtain information about another computer activities by transmitting data from their hard drive
Define Malware
software which is specifically designed to disrupt or damage a computer system.
Define Keylogger
a computer program that records every keystroke made by a
computer user, especially in order to gain fraudulent access to passwords and
other confidential information.
Define Malicious damage
when a person intentionally sets out to corrupt or delete electronic files, data or software programs.
Define Accidental damage
when a person unintentionally corrupts or deletes electronic
files, data or software programs. Loss of data leading to damage to company’s
reputation Loss of data leading to fines or prosecution / GDPR
Define Botnets
a network of private computers infected with malicious software and
controlled as a group without the owners’ knowledge, e.g. to send spam.
What does Hardware failure lead to
loss of data
What does ID theft lead to
personal losses/fraud
How does levels of permitted access protect the security and integrity of data
certain users would have different/restricted
access to certain data or parts of the system
How does Write-protect mechanisms protect the security and integrity of data
Write-protect mechanisms
How does Strong secure password protect the security and integrity of data
the organisation limits access to the network by ensuring that all authorised users have a strong secure password.
How does access rights protect the security and integrity of data?
access to confidential files on the network is limited to authorised users only by assigning access rights to users that only allow certain users to access specified area of the network and/or specified files.
How does Encryption protect the security and integrity of data?
hackers are prevented from reading the confidential files even they
gain access to it by encrypting the files Encryption – an encryption key is used
and known only by the organisation
How does Firewall protect the security and integrity of data?
the servers would be protected with firewall software blocking / checking
all network traffic entering or leaving specified ports / stop programs accessing the
internet
How does backups protect the security and integrity of data?
copies of data held in order to restore in the event of data loss
How does antivirus software protect the security and integrity of data
regularly scans all files stored on them for possible infection by malware -
email server would be protected with antivirus software and all incoming emails would be scanned to see if attached files are infected
How does Policies / Legislation software protect the security and integrity of data
relevant descriptions based on current legislation or company policies – all files accessed by a user are recorded in an activity log
Describe contingency planning to recover from damage
During the disaster; the company should