0% found this document useful (0 votes)
30 views4 pages

Chapter Risk To Data and Personal Inforfmation

Uploaded by

kingmushfiq956
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views4 pages

Chapter Risk To Data and Personal Inforfmation

Uploaded by

kingmushfiq956
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Chapter 6:Risk to data and personal information

1. What is a computer virus? How can it spread?

Answer: A computer virus is a program or a piece of code that is loaded onto your computer
without your knowledge and runs against your permission. These software are created with
the intention to do harm. Virus can be spread across networks and bypassing security
systems.

2. Explain the various types of virus given below:


a) Ransomware
b) Trojan Horse
c) Spyware
d) Adware

Answer: The various types of viruses are:

a) Ransomware: Ransomware threatens to delete a user’s files or place restrictions on a


user’s access to software or resources until money is paid, usually t5o an anonymous
account.
b) Trojan Horse: A Trojan horse is a malicious software program that hides inside other
programs.
c) Spyware: Spyware can track internet search habits and can also redirect your web
browser to a different website that you intend to go to.
d) Adware: Adware is a malware that displays unwanted adverts to users.
3. State the purpose of pharming and phishing.

Answer: It is a technique used by criminals to get personal

information and payment details from users.

4.How is phishing done?

Answer: Phishing messages are often sent as email, they appear to be from real organization
, such as: shop, bank and charities. These emails ask the users to provide their personal
information by replying to the message.

5.Write down two methods by which users are directed to a pharming site.

Answer: Pharming is a process where criminals create fake versions of trusted websites to trick
users into entering their login details. They can alter the domain name servers to make internet
traffic go to their fake site. Even the user can make a mistake and arrive at the fake website.

6.Explain the methods given below to secure data and personal information in a digital system.

a) Firewalls
b) Encryption
c) Passwords, pins and biometrics
d) CAPTCHA Test

Answer: The methods to secure data and personal information in a digital system are:

a) Firewalls: Firewall controls the data in and out of a network. It prevents unauthorized
access to a network and protect the network from malware.
b) Encryption: Encryption is the process, where a key is used to encode, scramble and
jumble data so that unauthorized users and prevented from being able to understand it.
c) Passwords, pins and biometrics: Passwords, pins, biometrics are used online to
authenticate a user so that they can access an online system, such as: webmail, online
bank account.
d) CAPTCHA test: These tests are used to make sure that data is entered by a human and
not by automatic software program known as: bot or web robot.

7. What is the function of Anti-virus? Give examples.

Answer: It prevents malware from accessing or operating on computers. It scans computer files
in real time and allow users to scan files, folders and disks. This software has to be updated
regularly because virus code an b e changed. Example: Kaspersky, AVG.

8.What is HTTPs? How does HTTPs enhance security?

Answer: HTTPs stands for Hypertext Transfer Protocol Secure. It authenticates payment
servers and provides encryption using Secure Socket Layer(SSL) and Transport Layer
Security(TLS). It keeps communications private and provides security for users online accounts.

9. Write about the three types of backup.

Answer: The types of backup are:

a) A full backup creates a copy of all files.


b) A differential backup creates a copy of all files that have changed since the last full
backup.
c) An incremental backup saves a copy of only the files that have changed since the last
full or incremental backup.

10. Nihal uses the internet for work.

a)i. Nihal uses this word as his password.

“Aeroplane”

Identify two features that make this a weak password.

Answer:

1) Not a mix of letters, numbers and symbols.


2) It is a common word not random characters.

a)ii. Complete the description:

Use a minimum of eight characters and mixture of letters and numbers.

b)Explain why phishing messages are sent to many users.

Answer: Phishing messages are often sent as emails. These emails ask the user to provide
their personal information by replying to the message.

11. James teaches in a school that uses a local area network and a wide area network.

a) One type of backup procedure that school could use is incremental backup. State one other
backup procedure the school could use to secure its data.

Answer: Full/Differential backup.

b)James uses a PIN to unlock his computers. Describe how a PIN system works.

Answer: PINs are used online to authenticates a user so that they can access an online system.
Such as: webmail, online bank account.

12.

John uses the internet to work from home.

a) Describe three ways how this page is a risk to Zara.

Answer: This page is an example of pharming. The domain name is suspicious , although this
looks genuine to trick Zara into entering data which can be used fraudulently.
b)Online hackers are a threat to John’s data. List two other threats to John’s data.

Answer: The two other threats can be:

a)Virus

b)Accidental Deletion

13. Mary plays online games on her laptop.

a)Each time Mary plays a game on her laptop, she updates the game software. Explain two
reasons why Mary should update.

Answer: Two reasons are:

i)To get new features that will increase the enjoyment.

ii)To fix bug, which stops the programs from working properly.

b)State one risk to Mary’s system of updating the game software.

Answer: Update could include malware, which could comprise her data.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy