A virus is a piece of programming code or software, which copies itself from one computer to another. It does this by attaching itself to files and is transferred via: email, programs/ files/images that are downloaded from the internet or portable media (like a USB stick). Viruses have the ability to:
-Intercept and/ or delete and corrupt files and data.
-Intercept and/ or delete and corrupt the contents of a hard disk.
-Make software unuseable.
-Intercept and/ or delete and corrupt files and data.
-Intercept and/ or delete and corrupt the contents of a hard disk.
-Make software unuseable.
Preventing Viruses
You can:
- Install anti-virus software to detect viruses and limit their damage by removing them.This software tries to detect viruses before they can damage your computer.
-Regularly update the anti-virus software.
-Only use the storage media from trusted sources.
-Only accept software/download from known websites.
-Only visit trusted websites.
-Only open attachments from people you know.
-Buy an encryption service.
- Install anti-virus software to detect viruses and limit their damage by removing them.This software tries to detect viruses before they can damage your computer.
-Regularly update the anti-virus software.
-Only use the storage media from trusted sources.
-Only accept software/download from known websites.
-Only visit trusted websites.
-Only open attachments from people you know.
-Buy an encryption service.
Encryption
Encryption scrambles data as it is transferred from one place to another, preventing data being intercepted by other hackers. Usually, it requires an encryption key/ software to encrypt the data and a decryption key to decrypt and decipher the unreadable data.
Encryption should be used for the following reasons:
-Sending credit card details, such as card numbers, expiry dates, ect, over the internet.
-Online banking.
-Sending payment details (bank details such as sort code numbers and account numbers).
-Confidential emails (with personal information).
-Sending data between computers where confidentiality is essential, for example: medical information.
-Storing sensitive information on laptops and portable devices and media.
Encryption should be used for the following reasons:
-Sending credit card details, such as card numbers, expiry dates, ect, over the internet.
-Online banking.
-Sending payment details (bank details such as sort code numbers and account numbers).
-Confidential emails (with personal information).
-Sending data between computers where confidentiality is essential, for example: medical information.
-Storing sensitive information on laptops and portable devices and media.
Why bother with encryption?
Hacking
-Gaining unauthorised access to a computer system.
-Gaining authorised access to s system but accessing areas without permission.
-May lead to illegally copying/deleting/changing data from a system.
-Gaining authorised access to s system but accessing areas without permission.
-May lead to illegally copying/deleting/changing data from a system.
Protection against hackers, so they can't:
-They could intercept emails.
-They could alter or collect personal information. For example: credit card numbers.
-They could alter or collect personal information. For example: credit card numbers.
Drawbacks
-Data can still be deleted form the system.
-Criminals can wrongly use encryption to keep illegal material secure.
-Criminals can wrongly use encryption to keep illegal material secure.
The Data Protection Act
The Data Protection Act 1998 is a law passed by the Government to give rights to people who have their data stored on any computer or storage system, including paper records. These rights include:
-Data users that collect data from data providers must only use it for the reason they told them.
-You cannot give people's data to other people if they do not agree to it.
-Data providers have the right to see the data stored about them.
-The data taken from people must be up to date.
-Data users must not hold data for longer than necessary.
-Data users that collect data from data providers must only use it for the reason they told them.
-You cannot give people's data to other people if they do not agree to it.
-Data providers have the right to see the data stored about them.
-The data taken from people must be up to date.
-Data users must not hold data for longer than necessary.