0% found this document useful (0 votes)
20 views

Topic 1 - Risks To Data and Information

There are several risks to personal data and information when operating online: - Unauthorized access when hackers gain access to networks or use devices as botnets. - Malware like ransomware that can delete files or restrict access until payment is made. - Accidental deletion when users mistakenly remove files. - Theft of data through phishing scams using emails to steal login details, or pharming which redirects websites to steal information through fake web forms. Users must carefully check URLs to avoid fake sites.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views

Topic 1 - Risks To Data and Information

There are several risks to personal data and information when operating online: - Unauthorized access when hackers gain access to networks or use devices as botnets. - Malware like ransomware that can delete files or restrict access until payment is made. - Accidental deletion when users mistakenly remove files. - Theft of data through phishing scams using emails to steal login details, or pharming which redirects websites to steal information through fake web forms. Users must carefully check URLs to avoid fake sites.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 17

Recap Units to covers

•Digital Devices
•Connectivity
•Operating online
•Online goods and services
•Applying ICT
•Software skills
OPERATING ONLINE 1
Unit 3:
OPERATIN
G ONLINE
_________

Tr:
Kikambi John
Bosco
OPERATING ONLINE 2
Topic six: Risks
to Data and
Personal
Information

OPERATING ONLINE 3
Overview
The amount of data communicated online in order to
carry personal and financial information is almost
unimaginable. For example;-

OPERATING ONLINE 4
INTRODUCTION
• Huge amounts of data are transmitted and stored
digitally, and a lot of this data contains personal or
financial information.

• Because of this, digital systems are targeted by criminals


who try to access data so that they can use it to commit
fraud or identity theft.

• You need to be aware of the risks to your data when


operating online. You also need to know about the
methods that are used to secure data in order to prevent
unauthorized access and use.
OPERATING ONLINE 5
OBJECTIVES OF TOPIC SIX

Objective 1: Be aware of risks to data and


information. Including but not limited to;-
 Unauthorized access
 Deliberate damage by malware
 Accidental deletion
 Theft of personal data:
• phishing,
• pharming
OPERATING ONLINE 6
Risks to Data and Personal Information
• UNAUTHORISED ACCESS: is when the
users access the networks when they are not
permitted to access them. They attempt to
gain access to networks directly by
themselves.
• Sometimes, devices on a network can be
targeted by unauthorized users in order to
be used as botnets.
• Botnets are groups of computers that have
their resources used for harmful purposes,
such as spreading malware.
OPERATING ONLINE 7
• DELIBERATE DAMAGE BY MALWARE: malware (Malicious
software) is a software that is created with the
intention to do harm.
Malware can;-
• show messages
• play sounds
• delete files
• Reprogram systems to perform tasks that will harm
the system and the connected hardware.
Some malware (known as ransomware) threatens to
delete a user’s files or places restrictions on a user’s
access to software or resources until money is paid,
usually to an anonymous account.
OPERATING ONLINE 8
Ransomware
• These messages are usually very

threatening and distressing for

users.

• They are often written in a way

that makes the user believe that

they must pay quickly. This puts

pressure on the user to act before

they have time to think clearly

about the threat and how to

manage it.

OPERATING ONLINE 9
• ACCIDENTAL DELETION: Users can
sometimes delete files or even the entire
contents of a drive by mistake.
• This can happen if:
• they press a key on a keyboard by
accident
• they format media on the wrong
storage device
• their device loses power unexpectedly.
OPERATING ONLINE 10
THEFT OF PERSONAL DATA: Criminals use a number of methods to
steal personal data.

a) PHISHING: Phishing is a technique used by criminals to get


personal information and payment details from users.

Phishing is defined as the criminal activity of sending emails that is


intended to trick someone into giving away personal information. Such
as their bank account number or their computer password; which is
then used to get money or goods.

It involves sending large numbers of messages that appear to be from


real organizations, such as shops, banks or charities. Phishing messages
are often sent as emails.

These emails ask the user to provide their information by replying to


the message or following a hyperlink that opens a webpage into which
the user is asked to type their personal details.
OPERATING ONLINE 11
Phishing

Phishing messages can also be sent via SMS or instant


message apps so that users open the fake webpage in a
mobile browser.

SMS phishing is sometimes referred to as smishing.


OPERATING ONLINE 12
• b) Pharming: with pharming, Criminals
create fake versions of trusted websites
to trick users into entering their login
details, which are then used by the
criminals to access users’ accounts.

OPERATING ONLINE 13
Methods by which users are directed to a pharming site.

• There are two main methods by which users are directed to a pharming

site.

• Internet traffic going to the real website is redirected to the fake

website, so that users think they are visiting the real thing. Criminals

change the domain name servers to make internet traffic go to their fake

site. Example of URLs

• https://www.unicef.org/ Correct

• https://www.unicef_international.org/ Fake.

• Often, the URL of a pharming website is designed to be very similar to the

URL of the real website.

• Users should always check the URL of websites that they visit to make

sure that they are not fake websites


OPERATING ONLINE 14
• Figure 6.4: A fake webform, linked from an
SMS message and opened in a mobile
browser
OPERATING ONLINE 15
• Figure 6.5 Users should always check the URL of
websites that they visit to make sure that they are
not fake websites
OPERATING ONLINE 16
Pharming terms
• Webform a data entry form on a web page

• Internet traffic: data transferred between


computers connected to the internet

• Domain name server a computer connected


to the internet that translates domain
names, such as pearson.com, into IP
addresses.
OPERATING ONLINE 17

You might also like