Please enable JavaScript.
Coggle requires JavaScript to display documents.
1.4 Security - Coggle Diagram
1.4 Security
Data
-
-
Backups and archives
-
Archived data is data that is no longer needed for immediate processing, but needs to be kept
This could include, for example, the last seven years of company accounts, manuscripts of published books, exam results of past students
-
-
-
Backups
Storage of Backups
In a small company, this may just mean that an employee takes a backup tape home with them every evening and swaps it every day for the latest backup
In a large company, all transactions may be mirrored onto a second remote computer
-
-
-
Threats to Online Data
Phishing
You receive what looks like a legitimate email, for example from a bank or an organisation such as PayPal or eBay
This website urges you to visit a bogus website and enter your personal details, which are then captured by the phishers
A phishing email is one that tricks you into handling over sensitive or personal information (login details, bank details, etc.)
Does it work?
Phishers send out hundreds of thousands of emails that look as though they are from legitimate companies
For phishing to be successful, the criminals must get you to click on a link in the email to go to a website.
What to look out for?
Greeting
The phishers don't know your name- just your email address, so the greeting is not personalised
-
Forged link
The link looks genuine, but it may not link to the website given. Roll your mouse over it to check
-
-
-
-
Pharming
Instead of using a phony link in an email, pharming re-directs victims to the bogus site even if they have typed the correct web address
-
-
-
Trojan Horse email
When you open the attachment or click on the link, it installs a virus on your computer
-
Offers something tempting to look at, either an attachment or link - for example a funny video
Virus- Generated Email
Typically includes a product or shop recommendation, or asks for emergency cash
-
Usually means your friend's email has been infected with a virus and has sent the email to their whole address book
-
-
Software
System Software
-
For Example, an operating system such as Windows
Application Software
-
For Example, word processing software
Security
Encryption terminology
-
Key : a sequence of numbers used to encrypt or decrypt, often data using a mathematical formula
-
-
-
-
-