CH-6 (1)
CH-6 (1)
• Users can sometimes delete files or even the entire contents of a drive
by mistake.
• This can happen if:
■ they press a key on a keyboard by accident
■ they format media on the wrong storage device
■ their device loses power unexpectedly.
Theft of Personal Data
❑ Pharming
• Like phishing
• Criminals create fake versions of trusted websites to trick users into
entering their login details, which are then used by the criminals to
access users' accounts.
Theft of Personal Data
1. Firewalls
• Firewalls control the data travelling into and out of a network.
• They examine the network addresses and ports of the data.
• They compare those details to a list of rules that can be changed by
network administrators.
• The list of rules determines what traffic should be allowed to travel
into and out of the network.
• In this way, firewalls can prevent unauthorised access to a network and
protect the network from malware.
Methods to Secure Data and Personal Information Online
2. Encryption
• Encryption uses a key to scramble data into an unreadable form.
• If encrypted data is intercepted on the network, it is useless unless the
interceptor has or can identify the key.
Methods to Secure Data and Personal Information Online
3. Passwords, PINs and Biometrics
• Passwords, PINs and biometrics are used online to authenticate a user so
that they can access an online system, such as webmail or an online bank
account.
• Users should make sure that their password is:
■ more than eight characters long
■ a mix of letters, numbers and symbols
■ a mix of uppercase and lowercase letters
■ made up of random characters
■ changed frequently
■ something that they have not used before.
Methods to Secure Data and Personal Information Online
• reCAPTCHA tests work in the same way as CAPTCHA tests, but they
use extracts of text from scanned books or a selection of images that
share common features.
• When a user solves a reCAPTCHA test, their solution is used to help
digitise books and annotate images.
Methods to Secure Data and Personal Information Online
5. Anti-malware
• Anti-malware prevents malware from accessing or operating on
computers.
• It scans computer files in real time and allows users to scan files,
folders, disks or whole systems.
Methods to Secure Data and Personal Information Online
➢ Anti-virus
• A virus is malware that uses networks to spread to connected devices.
• Viruses are spread via communication software such as email or web
browsers or by being loaded into a computer's memory from external
storage such as USB flash drives.
• Viruses often look like normal files.
Methods to Secure Data and Personal Information Online
➢ Anti-adware
• Adware displays unwanted adverts to users.
• Anti-adware software detects, quarantines and removes adware.
Methods to Secure Data and Personal Information Online
➢ Anti-spyware
• Spyware secretly monitors and records computer data and user input.
• For example, a keylogger is a type of spyware that monitors and
records actions such as key presses or mouse movements.
• Criminals can analyse this information to identify a user's passwords
for websites, or financial data such as credit card numbers and security
codes.
• Anti-spyware software detects, quarantines and removes spyware.
Methods to Secure Data and Personal Information Online
7. Secure Websites
• Hypertext Transfer Protocol (HTTP) is used to exchange data between a
web server and a client.
• Data transferred using HTTP is not secure, so Hypertext Transfer
Protocol Secure (HTTPS) was developed.
• HTTPS authenticates payment servers and provides encryption using
Secure Socket Layer (SSL) and, more recently, Transport Layer Security
(TLS).
Methods to Secure Data and Personal Information Online
9. Backup procedures
• Backups create one or more copies of data.
• A backup is usually stored to an external storage device.
• This makes the data more secure, because the backup files will be safe
even if the original storage device fails or is damaged, lost or stolen.
Methods to Secure Data and Personal Information Online
➢ Keep one copy of a folder containing important files backed up using online
storage.
➢ Store copies at multiple locations.
➢ Store important data in a fireproof safe.
Online Payment Systems
• People can pay for goods and services online using various payment systems.
• These systems send payment details across networks to computers that
process the payments.
Online Payment Systems
➢ Bank cards
• Bank cards allow customers to pay for goods and services online and in shops.
• When paying online, you usually need to enter the:
✓card number
✓expiry date (and sometimes the start date) of the card
✓name on the card
✓three-or four-digit card security code (CSC)
Online Payment Systems
• When a user chooses to use a card online, they are sometimes asked to
authenticate the payment by entering a password using a secure system.
• These systems are used by financial organisations such as Mastercard which
operates the Mastercard SecureCode system.