File Management and Protection/Common Threats
|File Management and Protection|
|Common Threats||Introduction | Identifying common threats | Ensuring integrity | Securing your system | Key points | Assessment|
Welcome to Unit 2: Common Threats. This unit will provide you with the necessary knowledge and skills on protecting your computer system and data.
Why protect your system?
Your computer system holds all your valuable information. Without the data on the system a business cannot make money, provide you (and maybe lots of other people) with a job, YOU cannot complete a project, or YOU might lose your favourite game.
Why protect your data?
Data is the life blood of a business. It is generally the greatest asset of the business, but disasters can happen and data can be threatened or destroyed. Data must also be correct and useful to the business (it must have integrity).
A software virus is a parasitic program written intentionally to alter the way your computer operates without your permission or knowledge. A virus attaches copies of itself to other files such as program files or documents and is inactive until you run an infected program or open an infected document. When activated, a virus may damage or delete files, cause erratic system behaviour, display messages or even erase your hard disk.
A virus may spread through email and instant messenger attachments, through infected files on floppy disks or CD-ROMs, or by exploiting a security flaw in Microsoft Windows.
How can I protect my system and data?
A firewall is a combination of hardware and software that provides a security system to prevent unauthorised access from other Internet or Intranet users to your computer. A firewall prevents direct communication between the two computers by routing communication through a proxy server outside of the network. The proxy server determines whether it is safe to let a file pass through to your computer.