Note that your final mark will not be saved in the system.
D1 Threats to data, information and systems GapFill
You must fill all the gaps before clicking ‘Check Answers!’
There are lots of organisations that hold data and information about you. When that data is specific to you, for example your name, date of birth and medical information, we call that data. Companies that use that data are your data. That data is very valuable to attackers who might want to you – for example they might want to log in to your social media or account to reset your passwords or steal credit card details to sell on the black market.
Therefore, companies must your data from hackers and their increasingly sophisticated methods of attack.
The generic term for viruses, and related programs (worms and Trojans, etc.) is . One form is a which infects a file and spreads when the file is opened – for example it might delete files or attach itself to other files. A is designed to spread across networks slowing them down. A might pretend to me a useful program while sending data and logins back to the attacker, and might open up a back door for more malware to infect the system.
is or are a relatively new type of malware where all of the users’ files are encrypted meaning that if there are no recent backups of the computer or server, when the files are lost if there is no payment made to the attacker to decrypt them.
We call people who distribute malware or who try to break into systems . Their activity is usually illegal, unless they have been asked to try and break in to systems in order to find and fix security risks. Their goal may be to steal details in order to sell on for profit, or might just want the prestige of breaking in to a system.
Sometimes you receive an email purporting to have been sent by your bank. This is done to try and gain real logins or account information and is called . Sometimes the email might tell you that your account has been hacked and you need to supply them with information in order to recover your money.
However, sometimes the damage is – for example deleting a file by mistake so saving over a file in error – hopefully has been taken in order for the file(s) to be restored from.