Our site uses cookies. Some of the cookies we use are essential for parts of the site to operate and have already been set. You may delete and block all cookies from this site, but parts of the site will not work. To find out more about cookies on this website, see our Cookie Policy
Accept
© eRevision.uk and ZigZag Education 2025
This test is run by .
Note that your final mark will not be saved in the system.

Impacts GapFill

Target Level
Pass
Running Total
0
0%
Attempt
1 of 3

You must fill all the gaps before clicking ‘Check Answers!’

Each data breach, loss or modification has   an advantagean impacta datea time – the amount of data lost, and the type and severity, has a direct effect on the impact. The impact can range from a small inconvenience, such as having to recover a couple of files, to large  gainsfinancesfinessavings and damage to customer confidence.

The data owned by businesses is called  intelligentindependentinfluentialintellectual property (IP for short), which includes all of the knowledge, patents and copyrights held by a company. Loss of some of that data might not be a huge issue, but the loss of secret information that could be seen by a  pubic agencycompetitormanagergovernment could have catastrophic consequences for competitive advantage.

Sometimes a hacker might take a system offline through  a brute forcea diala denialan entry of service attack, or following the discovery of a data breach, meaning that the company might have to go back to working on paper, with a huge loss of  datapaperproductivitycosts, and public-facing selling services might be unavailable too, resulting in a loss of  damageincomeinformationinfrastructure.

When confidential information, such as personally identifiable information, is breached, fines may be issued by the  InfrastructureImageInformedInformation Commissioner’s Office, and could be potentially millions of pounds for the largest companies. Businesses also store and handle  fifthfirstsecondthird-party data – e.g. companies such as Google and Microsoft may host your files and documents in their data centres.

A major data breach from a major company can lead to a loss of  commissionersreputationinformationbrute force as affected customers take their business elsewhere, and potential new customers might be put off from joining. To offset the costs of a breach, some companies take out  antiviruscyber securityoffice insurancecyber insurance policies.

An evolving threat is cyber  informationcommunicationfriendshipwarfare, espionage and hacking. A national government or a terrorist organisation could attempt to hack into government and  militarybusinessunclassifiedpublic servers to obtain classified information about the government, the running of the country and information about military institutions – all threats to  nationalindividualinternationalpersonal security.

This is your 1st attempt! You get 3 marks for each one you get right. Good luck!

Pass Mark
72%