Chapter Risk To Data and Personal Inforfmation
Chapter Risk To Data and Personal Inforfmation
Answer: A computer virus is a program or a piece of code that is loaded onto your computer
without your knowledge and runs against your permission. These software are created with
the intention to do harm. Virus can be spread across networks and bypassing security
systems.
Answer: Phishing messages are often sent as email, they appear to be from real organization
, such as: shop, bank and charities. These emails ask the users to provide their personal
information by replying to the message.
5.Write down two methods by which users are directed to a pharming site.
Answer: Pharming is a process where criminals create fake versions of trusted websites to trick
users into entering their login details. They can alter the domain name servers to make internet
traffic go to their fake site. Even the user can make a mistake and arrive at the fake website.
6.Explain the methods given below to secure data and personal information in a digital system.
a) Firewalls
b) Encryption
c) Passwords, pins and biometrics
d) CAPTCHA Test
Answer: The methods to secure data and personal information in a digital system are:
a) Firewalls: Firewall controls the data in and out of a network. It prevents unauthorized
access to a network and protect the network from malware.
b) Encryption: Encryption is the process, where a key is used to encode, scramble and
jumble data so that unauthorized users and prevented from being able to understand it.
c) Passwords, pins and biometrics: Passwords, pins, biometrics are used online to
authenticate a user so that they can access an online system, such as: webmail, online
bank account.
d) CAPTCHA test: These tests are used to make sure that data is entered by a human and
not by automatic software program known as: bot or web robot.
Answer: It prevents malware from accessing or operating on computers. It scans computer files
in real time and allow users to scan files, folders and disks. This software has to be updated
regularly because virus code an b e changed. Example: Kaspersky, AVG.
Answer: HTTPs stands for Hypertext Transfer Protocol Secure. It authenticates payment
servers and provides encryption using Secure Socket Layer(SSL) and Transport Layer
Security(TLS). It keeps communications private and provides security for users online accounts.
“Aeroplane”
Answer:
Answer: Phishing messages are often sent as emails. These emails ask the user to provide
their personal information by replying to the message.
11. James teaches in a school that uses a local area network and a wide area network.
a) One type of backup procedure that school could use is incremental backup. State one other
backup procedure the school could use to secure its data.
b)James uses a PIN to unlock his computers. Describe how a PIN system works.
Answer: PINs are used online to authenticates a user so that they can access an online system.
Such as: webmail, online bank account.
12.
Answer: This page is an example of pharming. The domain name is suspicious , although this
looks genuine to trick Zara into entering data which can be used fraudulently.
b)Online hackers are a threat to John’s data. List two other threats to John’s data.
a)Virus
b)Accidental Deletion
a)Each time Mary plays a game on her laptop, she updates the game software. Explain two
reasons why Mary should update.
ii)To fix bug, which stops the programs from working properly.
Answer: Update could include malware, which could comprise her data.