0% found this document useful (0 votes)
27 views

CH# 6 Risks To Data

Uploaded by

Muhammad Faiez
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views

CH# 6 Risks To Data

Uploaded by

Muhammad Faiez
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

RISK TO DATA

Digital Network:

As the devices are connected and huge amount of


data are transmitted and stored digitally, and lot
of this data contains personal or financial
information. Because of this digital system are
targeted by criminals who try to access data so
that they can use it to commit fraud or identity
theft.
ONLINE SERVICES
Examples of Risks to data:
• Unauthorized access
•Deliberate damage by malware
•Accidental deletion
•Theft of personal data
•Phishing
•Pharming
ONLINE SERVICES
Methods to secure Personal data:
• Firewalls
•Encryption
•Passwords,
•Pin
•Biometric
•CAPTCHA tests & Security Questions
ONLINE SERVICES
Methods to secure Personal data:
• anti-malware
•Anti-virus
•Anti-adware
•Anti-spyware
•Access rights
•File permissions
•Secure websites
•Not opening unknown attachments
•Backup Procedures
ONLINE SERVICES
1. Unauthorized access:
Access to the network or data by users who are not permitted to access
them is called unauthorized access.
Gaining access to the user PC illegally is called unauthorized access

2. Malware (malicious software)


This is a type of program or software which created with the intention
to harm other PC/Data is called malware. E.g ransomeware
ONLINE SERVICES
1. Unauthorized access:
Access to the network or data by users who are not permitted to access
them is called unauthorized access.
Gaining access to the user PC illegally is called unauthorized access

2. Malware (malicious software)


This is a type of program or software which created with the intention
to harm other PC/Data is called malware. Example ransomware
ONLINE SERVICES
3. Accidental Deletion:
When the data is deleted by the users by mistake.
How ?
- by pressing a delete key from the keyboard
- By formatting the disk or flash.
- Power failure some time.
4. Encryption
To scramble the data into a form which is not understandable by the
others
ONLINE SERVICES
5. Decryption:
Decoding the data again to its original form is called decryption by
using a certain key/algorithm
ONLINE SERVICES
5. Decryption:
Decoding the data again to its original form is called decryption by
using a certain key/algorithm
ONLINE SERVICES
5. Phishing:
Phishing is the criminal activity of sending emails or having a
website that is intended to trick someone into giving away personal
information such as their bank account number or their computer
password.
This information is then used to steal money or goods.
ONLINE SERVICES
6.Smishing:
SMS phishing is sometimes referred to as smishing
ONLINE SERVICES
7. Pharming:
Pharming is a technique used by criminals to gain personal
information and payment details from users. Criminal create fake
versions of trusted websites to trick users into entering their login
details, which are then used by the criminals to access users’
accounts.
Methods:
There are two methods by which users are directed to pharming
sites.
ONLINE SERVICES
1. Internet Traffic:
Criminals do this by altering the domain name servers to make
internet traffic go to their fake site. They can use malware to redirect
web requests.

2. URL
URL of a pharming website is designed to be very similar to the URL
of the real website. This means that if a user misspells the URL
when typing it into the address bar of their web browser, they could
go to the pharming site by mistake.
THANK YOU
HOME WORK

Home work
Exercise Q1 to Q11
Page:175

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy