• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Threats to customer Data

Extracts from this document...

Introduction

Threats to Customer Data In this century there more and more computers being made and customised by everyone but there are many risks to these computers which can damage them. These are the threats to the customer' data 4 threats. Ways to counter them. Assess! Computer misuse act and their effectiveness. The purpose of data protection legislation is to ensure that personal data is not processed without the knowledge. Viruses Hackers Spy ware Hardware failure Human error Dishonest employees Natural disasters Theft Terrorism Flood and Fire Viruses A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the user. The term "virus" is also commonly but also used to refer to other types of malware, ad ware and spyware programs that do not have the ability to create itself again. A true virus can only spread from one computer to another when its host (some form of code) ...read more.

Middle

* Getting an antivirus-viruses in the computer are detected by the antivirus and stopped and then removed, it also informs the users if they have entered any suspicious websites and tells us to avoid it or blocks us from it automatically. An antivirus completely removes viruses or other harmful soft wares which is also called malware in computing terms. * Not using the computer infected-if a computer has been infected by a virus, it's not safe to continue using the same computer without completely reinstalling the operating system. There are still a number of recovery options that exist after a computer has a virus. These actions depend on severity of the type of virus. System Restore, which restores the computer and sensitive system files are removed and the computer's status is back to what it was from when it was bought. Although you will lose all your files completely and will have reinstall everything. ...read more.

Conclusion

Prevent spywares to enter our system Don't run unnecessary network services - When installing systems, any non-essential features should be disabled. If a feature is installed but not actively used, it is less likely to be updated regularly, presenting a larger security threat. Also, allow only the software's you need there because other software's could give you many risks. Norton Internet Security is well known software which is secure and protects us from going on websites which aren't safe. Implement a firewall - A firewall is a kind of like a barrier that keeps hackers and viruses out of computer networks. Firewalls restrict network traffic and allow only authorized data to pass through and tell us if we have any risks also if we have our firewalls turned off it gives us warnings to turn it on. The threats can be stopped depending on just our actions for example, downloading files from unknown sites and poor habits of opening up strange email attachments and there are many other mistakes made by people which give more options to the hackers or make it easier for them to hack in. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    Even though it is has a relatively high transmission rate it does not cope well with eavy traffic rates. * There is a limited amount of cable and workstations that can be used and connected. * If the network is cable is broken it can cripple the whole network, the computer will be functioning but cannot communicate with each other.

  2. Smart Card System

    After that, the supervisor has to input the student login name, login password and also confirm the password. The students or staffs could change the login name and login password entered by the supervisor. III. Log File In this feature, the supervisor would be able to view the information regard

  1. Ways of Promoting a Website

    JavaScript allows the web page designer greater control and allows additional features to be incorporated that you couldn't just get with the standard HTML package. An example of Java script could be a link on a website that when clicked automatically opens up the favourites menu on the users computer to allow it to be book marked.

  2. AQA Computing CPT3

    Number 0.90 - 5.00 1.47 This will store the price of the petrol per litre pumpStatus String Up to 255 legal characters 'Pump Is Ready To Use' This will store the petrol pumps status for the customer messageBox String Up to 255 legal characters 'Please Accept Payment' This will store

  1. Firewall Protection

    it can also know what was the web page that referred to it, and any other information that the affiliated web site wanted to deliver to the tracking site. This way tracking sites can correlate information from many affiliated sites, to build information that for example will allow them to

  2. importance of data security and data safety

    The different between Intranets and Extranet is: Intranet: Allow the members of organisation to access the access the system with an organisation. Extranet: Allow the members of organisation to access the system from different location but only by the users who have been given access rights.

  1. Flexible Architectures in Communication Security Application

    have particularly good diffusion properties [23], and the operation can be easily reversed with modular multiplication of the modular inverse of the multiplicand. If the multiplicand is part of the key, all divides (which are typically much more expensive) can be confined to the cipher setup code.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    * The program has to be reliable. There will be no errors in the program due to coding which will could cause a fault within the program or make it crash causing lose of data. The system will have to be reliable in order for it to be effective otherwise the old system may be preferred by the user.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work