Risks to Data and Personal Information Flashcards
What is hacking?
Unauthorized access gained to a computer system.
What are the effects of hacking?
Files copied/deleted/corrupted/edited, identity theft, exposure of a company.
How can hacking be prevented?
Having a firewall, strong passwords, protection software and a professional hacker to try and hack you.
What are viruses?
Programming codes which are installed and replicated on a computer system without the user’s permission.
What are the effects of viruses?
Slower performance, files lost/corrupted/deleted and stopping of production.
How can viruses be prevented?
Updated antivirus software, not using software or USB from unkown sources and being careful when clicking links/downloading attachments.
What is spyware?
Software which monitors your use of the computer and which keys are pressed.
What are the effects of spyware?
Passwords found out and additional harmful software installed.
How can spyware be prevented?
Anti spyware software and pointing device.
What is phishing?
A potential victim will receive an email which looks legitimate, but involves visiting a fake website and giving away personal information.
What are the effects of phishing?
Personal details found out, fraud and identitfy theft.
How can phishing be prevented?
Filter on your email account and double checking URLs and email addresses.
What is pharming?
Malicious code installed onto a web server which redirects users to a fake website.
What are the effects of pharming?
Personal details found out, fraud and identity theft.
How can pharming be prevented?
Double checking the URL and using anti spyware software.
What are smishing and vishing?
Users receive a fake SMS message saying they have won a prize (smishing), but are asked to call a premium phone number. Can use an audio to sound like a real person (vishing).
What are the effects of smishing and vishing?
Personal details found out and loss of money.
How can smishing and vishing be prevented?
Double checking SMS messages, checking the link of a website and contacting your bank if suspicious people are requesting details.
What is spam email?
Emaill sent out from a mailing list and can be used to promote phishing scams or products.
What are the effects of spam email?
Personal details found out and network may become slower or unresponsive.
How can spam email be prevented?
Using a junk email filter, not signing up to mailing lists, not replying to spam emails and not giving away your email adress.
What is credit card fraud?
When a user is tricked into giving away their personal and financial information.
What are the effects of credit card fraud?
Unauthorised purchases can be made and money can be transferred out of the account.
How can credit card fraud be prevented?
Strong password, ensuring secure connection, having updated anti spyware software and checking bank statement.
What are biometrics?
Relies on unique human characteristics for identification.
Are there any other ways of preventing risks to data and personal information?
Being aware of scams, reporting attempts of people trying to gain information and having a firewall.
What is encryption?
Converts information into a form that is meaningless to anyone except holders of a ‘key’.
What is Cloud?
An online storage medium used to backup files. Internet connection is required to access files.
What are the risks of Cloud?
Data lost during routine backups, celebrity data hacked and concerns about the security of the building where servers are held.
What are digital certificates?
Verify the identity of the sender and provides the receiver a chance to gove an encrypted response.
What is Secure Socket Layer (SSL)?
A green padlock/S/company name in a URL shows that a website is secure.
What is Captcha?
Tells humans and computers apart.
What do full backups do?
Create a copy of all files.
What do differential backups do?
Creates a copy of files that have been changed since the last full backup.
What do incremental backups do?
Creates a copy of files that have been changed since the last full or incremental backup.
What information is needed to make a payment?
Card number, expiry date, name on card and CSC/CVC code.
What is near field communication (NFC)?
A payment method which doesn’t require a pin.