click to edit title

Hacking Gaining unauthorised access to a computer with the intention of corrupting
or stealing data.

Data Theft Stealing digital information stored on computers or electronic devices to
obtain confidential information.

click to edit

Malware Malware is short for Malicious Software designed to cause harm to a

computer system. It is usually downloaded onto a computer unintentionally by

using the internet or from email attachments.

Examples include:

  • Virus
  • Worm
  • Trojan Horse
  • Spyware

Spamming Sending ‘junk’ emails, e.g. adverts for products; as a result, the inbox
becomes overloaded and time is wasted opening and reading such emails.

Phishing Sending emails that appear to be from a reliable source; these emails often
ask the recipient to update their personal information by clicking a hyperlink.

Phishing Sending emails that appear to be from a reliable source; these emails often
ask the recipient to update their personal information by clicking a hyperlink.

click to edit

Password A unique code that enables a user to log on to a certain file.

It should be at least 8 characters long and a mixture of numbers, uppercase

and lowercase letters and other symbols.

click to edit

Encryption This is the encoding of data before transmission and the decoding of the

data at destination. Data is meaningless if intercepted. Data can only be

decrypted using a key.

click to edit

Virus

Protection

Software used to protect the computer system from all forms of viruses

protects data from unauthorised access and corruption (from malicious

sources)

Firewall A software program monitors incoming and outgoing data. It prevents data


being hacked or unauthorised users from entering the network.

click to edit

Data Back

Up

To make a copy of data

If data is lost the system must have some method of recovering the data

there is a copy of the data that can be loaded on to the system if the

original data is lost. Backup copies of data are stored on a variety of media.