Threats to data
Natural disaster
floods, fires, hurricanes, tsunamis
Accidental damage
Unintended corruption, deletion or damage to data that is usually caused by human error
Malicious actions
Deliberate unauthorised actions intendedto cause damage by viewing, deleting, copying or corrupting data
Types of accidental damage
human error- data entry, accidental deletion
physical damage- dropping device and damage hard drive
power failure - electrical components damaged
hardware failure - hard disk crash
software crashing - in middle of operation and data lost
Types of malicious actions
hacking
malware
theft
6 examples of physical security
Backups
Made regularly so that data lost or corrupted can be restored
Archiving
Used for data that is no longer needed for immediate processing, but needs to be kept
9 ways to reduce risk of malicious actions
5 ways of reducing risk of accidental damage or loss
Secure passwords
Use a minimum number of ___ characters
Use a mixture of numbers, lowercase and uppercase characters
Include special characters such as &, !, #, %
Do not include your name, DOB or personal details
Audit trails
maintains a record of all activity that has taken place on a computer system
Every time a user accessed the system, the time and date are logged along with their actions
It can assist in detecting security violations