Learning Aim D Flashcards
What is ment by integrity of data in btec level 3 it
refers to the accuracy, consistency, and reliability of data throughout its lifecycle. It ensures that data remains unchanged and correct during storage, transmission, and retrieval. Maintaining data integrity is crucial to prevent errors, ensure trustworthiness, and support effective decision-making.
What can be done to prevent data errors in data entry
Manual data entry can result in errors, so proper training of staff is essential to ensure they know how to input data accurately, and the importance of doing so.
Auditing procedures need to be in place so that individuals can be held accountable for inaccurate data entry.
What is data verification
Data verification is the process of entering data twice, with the second entry being automatically checked against the first. If they match, the data is accepted. This is often used when entering and storing a new password.
What is data validation
Data validation should be used to ensure the values that the user can enter are restricted. Data validation checks include type checks, range checks, format checks, length checks and presence checks.
What are some types of malware
• Viruses
• Worm s
• Trojan horses (“Trojan”)
• Ransomware
What is a virus
A computer virus is a small piece of software that someone can attach to a host program such as a spreadsheet macro or computer game. Whenever the program is run, the virus program runs too, reproducing itself and attaching to other programs.
What is a worm
A worm is a standalone malware program that spreads to other computers, often via a network (including the Internet), generally relying on security weaknesses in the host computer to spread itself.
What is a trojan
The Trojan is malicious software masquerading as a legitimate email that invites the user to open an attachment, which then gives the controller unauthorised access to that computer. It may be used to access personal information such as passwords or banking information. Unlike a virus, Trojans do not normally inject themselves into other software or spread themselves.
What is ransomware
Ransomware is malicious software that, once installed on a computer, denies access to the computer until a ransom is paid. The NHS, universities and numerous commercial organisations suffered serious ransomware attacks in 2018 at the rate of about 38 new attacks every day.
What is DOS attacks
This is an attempt to make a website inaccessible to genuine users or to disrupt services by overloading the website servers and resources with fake traffic.
What is phishing
A phishing scam is a fraudulent email or message that appears to come from a legitimate organisation. Its purpose is to trick the recipients into sharing sensitive information such as passwords, usernames, bank and credit card details for malicious purposes. Attackers may make contact via email, social media, phone calls or text messaging.
What is spear phishing
spear-phishing attacks target a specific victim, and messages are modified to include personal information. This makes them much more difficult for a user to identify. The spear-phisher may get their information by viewing personal profiles on social media sites, from which they will be able to find, for example, a person’s email address, friends list and posts about new gadgets that were recently purchased. An attacker posing as a friend may ask for usernames and passwords for various websites so that they can access photos.
What is identity theft and the impact on individuals
It is when someone steals another person’s personal information, like their name, bank details, or Social Security number, and uses it without permission to commit fraud or other crimes.
Impacts:
• Identity theft can make victims stressed, anxious, unable to concentrate and have difficulty sleeping
• Identity fraud can also impact employment, housing, insurance, credit status and educational
opportunities
What is cyberstalking and the impact on individuals
Cyberstalking is the use of the Internet, email, instant or text messages, or social media posts to stalk or harass a victim
Impacts:
• Individuals who stalk offline wil usually use some form of technology as a tool, e.g. mobile phones, social networks, computers or geolocation tracking
• Cyberstalking is where the perpetrator uses technology but doesn’t actually stalk the person in the physical offline world
What are the Impacts on organisations when phishing attacks have occurred
Reputational damage: The publicity around a serious breach can be very damaging to the company. It may be perceived by customers as untrustworthy,
Intellectual property loss: Trade secrets, costly research, formulas and recipes, or customer lists may all be stolen for example, a single design could represent millions of pounds in research costs.
Direct costs: The cost of compensation to individuals who have had their data stolen and who have suffered personal financial losses or other consequences as a result, may run into millions. Fines for violations of the Data
Protection Act
Share value: Such an event may wipe millions of pounds off a company’s share value.