Study Notes
When data and personal information are transmitted and stored digitally, they face several risks such as unauthorized access, malware, accidental deletion, theft, and phishing attacks. Protection methods include using firewalls, encryption, authentication, anti-malware software, and safe user behavior.
- Unauthorized Access — Gaining entry to systems or data without permission. Example: Hacking into a company's database to steal customer information.
- Malware — Malicious software designed to damage or gain unauthorized access to systems. Example: A virus that corrupts files on your computer.
- Accidental Deletion — Unintentional removal of important files or data. Example: Deleting a critical document by mistake.
- Theft of Personal Data — Criminals stealing sensitive information for fraud. Example: Using stolen credit card details for unauthorized purchases.
- Phishing — Fraudulent attempts to obtain sensitive information by pretending to be a trustworthy entity. Example: Receiving a fake email from a bank asking for your login details.
Exam Tips
Key Definitions to Remember
- Unauthorized Access: Entry to systems without permission.
- Malware: Software designed to harm or exploit systems.
- Phishing: Fraudulent attempts to obtain sensitive information.
Common Confusions
- Confusing phishing with pharming, which redirects users to fake websites.
- Believing that encryption alone is sufficient without other security measures.
Typical Exam Questions
- What is phishing and how can it affect users? Phishing tricks users into revealing sensitive information, leading to identity theft.
- How does encryption protect data? Encryption converts data into unreadable format, preventing unauthorized access.
- What are the consequences of unauthorized access? It can lead to data breaches, financial loss, and identity theft.
What Examiners Usually Test
- Understanding of different types of malware and their effects.
- Knowledge of protection methods like firewalls and encryption.
- Ability to explain risks and recommend appropriate security measures.