File Management and Protection/Common Threats/Identifying common threats
File Management and Protection | |
---|---|
Common Threats | Introduction | Identifying common threats | Ensuring integrity | Securing your system | Key points | Assessment |
Identifing common threats
Identify common threats to data and system theory.
Threat | How do you know you have it |
---|---|
Internet and email risks leading to Virus/Trojan attack on your data and system |
Firewall alarm sounds Anti virus software confirms that a virus / trojan / worm is present System suddenly slows down Files are corrupt or scrambled and / or chunks of data are missing Emails going out from your system without you actually sending them Some advice from Amazon.com |
Unauthorised access leading to data corruption or deletion of your system and data |
Intruder detection log shows how many attempts were made to access your system Network rights / user profiles would prevent access to sensitive data but the rights need to be constantly checked IT facility could show forced entry eg door broken down, log of swipe card entries would show when an unauthorised card was used, video surveillance would be common in big business IT sections |
Power failure and surges A power surge or power failure could destroy your motherboard, your modem, your hard drive therefore your programs and data Power failure also results in loss of current data in RAM |
What is a power surge – a sudden surge in light from overhead lighting or flicker of your screen usually means a power surge or spike in power supply has occurred |