IT THEORY PART D Flashcards
WHAT IS A HACKER
A PERSON WHO EXPLOITS WEAKNESSES IN AN IT SYSTEM TO GAIN AUTHORISED DATA, THIS CAN BE DONT TO STEAL, ALTER OR DELETE YOUR DATA
WHAT IS PHISHING
AN UNAUTHORISED ATTEMPT TO GAIN PERSONAL OR SENSITIVE DATA WHICH CAN BE DONE IMPERSONATING A TRUSTED COMPANY SUCH AS SENDING A FAKE EMAIL WITH A LINK
WHAT ARE 3 WAYS TO REDUCE PHISHING
- NEVER SEND SENSITIVE DETAILS OVER THROUGH AN EMAIL
- DON’T FOLLOW LINKS FOR UNSOLICITED EMAILS AS IT CAN LEAD SITES TO HARMFUL SOURCES
- CHECK THE SOURCE OF THE EMAIL TO ENSURE THAT IT COMES FROM WHERE IT CLAIMS
WHAT ARE THE 2 MAIN TYPES OF FRAUD
IDENTITY FRAUD- STOLEN PERSONAL INFORMATION IS USED TO OPEN FAKE BANK ACCOUNTS OR TO SIGN UP FOR A MOBILE PHONE CONTRACT
BANK FRAUD- A CRIMINAL COULD LOG INTO YOUR BANK ACCOUNT TO WITHDRAW MONEY OR TRANSFER FUNDS
WHAT ARE SOME THREATS WHEN CONNECTED TO THE INTERNET
- COMPUTER THEFT AS SOMEONE COULD WALK IN TO THE OFFICE AND WALIK AWAY WITH THE PC
- MALAICIOUS DAMAGE AS SOMEONE CAN ADD OR DELETE MALAICIOUS DATA ON PURPOSE
- HDD COULD ENCOUNTER PROBLEMS AND EMPLOYEES CAN’T ACCESS THEIR DATA
WHAT ARE THE THREATS TO DATA WHEN USING A PORTBALE DEVICE FOR ONLINE BANKING
- ## OPEN TO HACKERS OR SOMEONE CAN GAIN UNAUTHORISED ACCESS