Please enable JavaScript.
Coggle requires JavaScript to display documents.
LO5 (5.6 Safe disposal of data and computer equipment (legislation…
LO5
-
Digital security
anti virus
An antivirus will search your computer for viruses and stop it from duplicating itself or getting stronger which the virus can lead to destroying your computer.
firewall
It controls incoming and outgoing traffic and stops anything that's not meant to enter by not allowing it and destroying it if it tires to.
-
encryptions
This is when data is scrambled so that it can not be understood by a 3rd party which is unauthorized
Threats
phishing
Phishing is a type of online identity theft that uses emails and fraudulent websites to steal personal data and information
virus
A malicious software program on a user's computer without the knowledge of the user to perform malicious attacks and can infect other programs by self replicating
eavesdropping
The unauthorized real time interception of a private communication such a phone call or instant message
social engineering
This is tricking people into giving their personal information or confidential data and can include other types of manipulation
security
Tokens
A token is an object that represents something else with a physical or virtual like a gift and in computer there are numbers of tokens
-
biometrics
These are scanner for fingers which scan a person's fingerprint looks to lock something and can only be opened by that same fingerprint which is secure as no 2 fingerprints are the same.
operational issues
-
data corruption
This is when someone usually by purpose corrupts the data in your computer however can be prevented by safeguarding your computer and by doing routine checks of hardware .
stolen data
This is when someone takes your data knowingly which is illegal and is not allowed and can be reported and can lead to you losing precious data and company secrets.