Protecting Data and Information 25-27 Flashcards
Malware
This is software designed to cause harm to your IT systems, such as deleting, altering or stealing data
Hackers
A person who exploits weaknesses in IT systems in order to gain unauthorized access
Phishing
A phishing email is one that pretends to be from a reputable company in order to get individuals to reveal personal information
Accidental damage
Not all threats to individuals and businesses are malicious
Anti-Virus software
Detects and removes viruses and other malware from a computer system
Firewalls
Monitor network traffic into and out of an IT system; block suspicious traffic to prevent unauthorized access
Encryption
The conversion of data into an unreadable code know as cipher text
Data Protection Act 2018
Protects the privacy of individuals’ personal data and gives rights to individuals on what data is collected and how their data is used
Computer Misuse Act 1990
Protect against attacks on IT systems used to gain unauthorized access and steal or cause damage to data