Risks And Security Related Issues In ICT Flashcards
(18 cards)
Risk
The potential or chance that something could happen that causes loss or damage
Threat
Things or actions that cause harm to a person, system or organisation.
Threats can be caregorised
Natural threat : acts of God.
Unitentional threats: accidental threats
Intentional threats: threats meant to cause harm
Security
Refers to the preventative measures put in place to mitigate risks
Examples of security measures
Keeping equipment safely locked up to prevent theft
Using antivirus software to protect computer systems
Using firewalls to protect networks
Intentional threats
Viruses
Trojans
Worms
Hoaxes
Phishing
Email spoofing
Unintentional threats
Input errors
Data type errors
Software errors
Hardware errors
Data verification:
This is the process od checking that the data entered by the user is accurate.
Data validation
The process used to check that data being transferred from one source to another does not get corrupted
Data validation techniques
Format checks
Length checks
Range checks
Spell checks
Check digits
Email risks precautions
Always scan email attachments before downloading them
Do not open or reply to kessages that look ‘phyishy’ or fraudulent
Delete unwanted spam from mailboxes
Do not share email login details with others
Internet risks
Internet related fraud scams such as pharming
Internet attacks using malware such as worms, viruses and ransomware
Unauthorized remote control administration of a computer system
Protecting hardware and software
Ensuring that they are kept in safe locations that are protected by lockable doors and gates
Always back up data in an off site location
Always ensure that all computers or other devices are installed with up-to-date antivirus software
Network safety, security and ethics security measures
Ensure that there is a firewall installed on the network
Ensure that firewalls are configured correctly so that the best level of protection is provided
Be aware of possible scams such as phishing, vishing and pharming
Ensure that you use strong oasswords that cannot be cracked or guessed and change passwords often
Use network ethically
Safeguards against cybercrime
Ensure your device is installed with an entivirus program and scan all external devices as well as attachments or downloads
Keep your personal information private.
Information privacy
The right of individuals or organizations to keep theur sata private or prevent their data from being collected and distributed
Risks to computer systems
Not understanding the difference between the right to access versus the right to privacy.
Misuse of personal information