Phishing- A type of threat
that attempts to gain access to passwords, financial details or such other
privileged information.
Malware- examples include
computer worms, Trojan, horses, which appear as some benign program.
Physical barrier- these
include turning off computers and locking offices when the systems are
unattended to prevent damage by people.
Access level- these can be
set up to allow individuals to have access to only specific levels of an
application to prevent unauthorised users for accessing particular data.
Encryption- this is used to
codify data so that it cannot be read by anyone who does not have the key to
the code.
Identity theft- when someone
steals your personal details in order to use them to open bank accounts ,
credit card , loans, a passport or driving licence in your name.
Purchase history
Computer systems are under threat of attack and the threats are continuous and ever-changing.
When a organisations secrets are spread to competitors or to
the wider public, and particular advantage to
the organisation will be lost.
Making a backup of data is the only way of recovering from a
total data disaster.
Accidental
damage- this can be cause by a natural disaster
e.g. flooding. This is a loss in confidence.
It is also possible to back up data across a network
No comments:
Post a Comment