File Management and Protection/Common Threats/Identifying common threats

From WikiEducator
Jump to: navigation, search
OtagoPoly Logo S.png




Identifing common threats

Identify common threats to data and system theory.

Threat How do you know you have it
Internet and email risks
leading to Virus/Trojan attack on your data and system

Firewall alarm sounds

Anti virus software confirms that a virus / trojan / worm is present

System suddenly slows down

Files are corrupt or scrambled and / or chunks of data are missing

Emails going out from your system without you actually sending them

Some advice from Amazon.com
For your protection, we suggest that you never respond to requests for personal information that may be contained in suspicious email.
It is best to assume any email that asks for personal financial information (or website linked to from such an email) is not authentic.

Unauthorised access
leading to data corruption or deletion of your system and data

Intruder detection log shows how many attempts were made to access your system

Network rights / user profiles would prevent access to sensitive data but the rights need to be constantly checked

IT facility could show forced entry eg door broken down, log of swipe card entries would show when an unauthorised card was used, video surveillance would be common in big business IT sections

Power failure and surges
A power surge or power failure could destroy your motherboard, your modem, your hard drive therefore your programs and data
Power failure also results in loss of current data in RAM

What is a power surge – a sudden surge in light from overhead lighting or flicker of your screen usually means a power surge or spike in power supply has occurred
System reboots itself suddenly
Power failure = nothing happening