File Management and Protection/Common Threats/Key points

From WikiEducator
Jump to: navigation, search
OtagoPoly Logo S.png




Key points



OP icon key points.gif

Key Points

On completion of this unit, you will now be able to identify common threats and describe them in terms of their impact on the data stored in a computer system, such as:

  • internet and email risks (leading to virus/trojan attack)
  • unauthorised access (leading to data corruption)
  • power failure and surges.





If you are completing the assessment for this course, please continue to ensure you have completed the assessment activities for this unit.

Otherwise, please continue with the next unit, Data Protection.

Acknowledgements

The content of this unit has been adapted from the Personal Computer Basics workbook, developed by the Community Learning Centre, Otago Polytechnic, December 2011.