Potential Risks to Data (Edexcel IGCSE ICT)
Revision Note
Unauthorised access & accidental deletion
What is unauthorised access?
Unauthorised access is when a user gains access to a network without permission
Unauthorised access can be the result of:
direct entry - a user tries to gain access directly by themselves or by by using software designed to try username and password combinations repeatedly (brute force attack)
indirect entry - a users tries to gain access indirectly by exploiting vulnerabilities in software or users
Some devices are the target of hackers to be used as botnets
Botnets are groups of computers that are used without an owners knowledge to carry out harmful activities or spread malware
Accidental deletion
Accidental deletion of data can occur when a user:
Presses the wrong key on a keyboard
Formats media on the wrong device
Loses power unexpectedly
Malware
What is malware?
Malware (malicious software) is the term used for any software that has been created with malicious intent to cause harm to a computer system
Examples of issues caused by malware include
Files being deleted, corrupted or encrypted
Internet connection becoming slow or unusable
Computer crashing or shutting down
There are various types of malware and each has slightly different issues which they cause
Malware | What it Does |
---|---|
Virus |
|
Worms |
|
Trojan |
|
Spyware |
|
Ransomware |
|
Phishing & pharming
What is a phishing?
Phishing is a form of social engineering
It involves sending fraudulent, legitimate-looking emails to a large number of email addresses, claiming to be from a reputable company or trusted source to try and gain access to your details
Phishing often tries to coax the user to click on a login button to enter their details
What are the effects of phishing?
The creator of the email can gain unauthorised access to personal data such as login information, bank accounts and more
Phishing can lead to identity theft or fraudulent activity on credit cards and bank accounts
How can phishing be prevented?
Phishing can be prevented by:
Anti-spam filters to avoid fraudulent emails arriving in a user's inbox
Training staff to recognise fraudulent emails and to avoid opening attachments from unrecognised senders
User access levels to prevent staff from being able to open files-types such as executable (.exe) files and batch (.bat) files
What is a pharming?
Pharming is typing a website address into a browser and it is redirected to a 'fake' website to trick a user into typing in sensitive information such as passwords
An attacker attempts to alter DNS settings or change a users browser settings to redirect users to the fraudulent website
What are the effects of pharming?
The creator of the malicious content can gain unauthorised access to personal data such as login information, bank accounts and more
Pharming can lead to identity theft or fraudulent activity on credit cards and bank accounts
How can pharming be prevented?
Pharming can be prevented by:
Keeping anti-malware software up to date
Checking URLs regularly
Make sure the padlock icon is visible
Worked Example
Explain why phishing messages are sent to many users
[2]
Answer
It increases the chances of a user responding [1] because not all users are vulnerable / phishing targets vulnerable users / more people are aware of phishing [1]
You've read 0 of your 5 free revision notes this week
Sign up now. It’s free!
Did this page help you?