• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Threats to customer Data

Extracts from this document...

Introduction

Threats to Customer Data In this century there more and more computers being made and customised by everyone but there are many risks to these computers which can damage them. These are the threats to the customer' data 4 threats. Ways to counter them. Assess! Computer misuse act and their effectiveness. The purpose of data protection legislation is to ensure that personal data is not processed without the knowledge. Viruses Hackers Spy ware Hardware failure Human error Dishonest employees Natural disasters Theft Terrorism Flood and Fire Viruses A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the user. The term "virus" is also commonly but also used to refer to other types of malware, ad ware and spyware programs that do not have the ability to create itself again. A true virus can only spread from one computer to another when its host (some form of code) ...read more.

Middle

* Getting an antivirus-viruses in the computer are detected by the antivirus and stopped and then removed, it also informs the users if they have entered any suspicious websites and tells us to avoid it or blocks us from it automatically. An antivirus completely removes viruses or other harmful soft wares which is also called malware in computing terms. * Not using the computer infected-if a computer has been infected by a virus, it's not safe to continue using the same computer without completely reinstalling the operating system. There are still a number of recovery options that exist after a computer has a virus. These actions depend on severity of the type of virus. System Restore, which restores the computer and sensitive system files are removed and the computer's status is back to what it was from when it was bought. Although you will lose all your files completely and will have reinstall everything. ...read more.

Conclusion

Prevent spywares to enter our system Don't run unnecessary network services - When installing systems, any non-essential features should be disabled. If a feature is installed but not actively used, it is less likely to be updated regularly, presenting a larger security threat. Also, allow only the software's you need there because other software's could give you many risks. Norton Internet Security is well known software which is secure and protects us from going on websites which aren't safe. Implement a firewall - A firewall is a kind of like a barrier that keeps hackers and viruses out of computer networks. Firewalls restrict network traffic and allow only authorized data to pass through and tell us if we have any risks also if we have our firewalls turned off it gives us warnings to turn it on. The threats can be stopped depending on just our actions for example, downloading files from unknown sites and poor habits of opening up strange email attachments and there are many other mistakes made by people which give more options to the hackers or make it easier for them to hack in. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    the transmitting data station detects that another station is transmitting signal that the first station will transmit a jam signal. Jam signal is used to request other transmission station that it needs to stop transmitting it does this by carrying a 32 bit binary pattern.

  2. Ways of Promoting a Website

    So where would xml be used? As its structure is simple it allows greater functionality when doing some of the following tasks; * Spreadsheets * Databases * Technical Drawings * Address Books It allows the format to remain fairly simple when producing, and then when combined with the HTML is explicit in producing a quality finished article.

  1. AQA Computing CPT3

    petrol that has been dispensed throughout the day tempSt String Up to 255 legal characters '0.48' This will provide a temporary variable locations which holds the representation of the digits, this is store in form of string tempNo Number 0 - 99.99 94.32 This will provide a temporary variable location

  2. Firewall Protection

    network, they enable the file and print sharing, without being aware that it influences also the authorizations of a remote Internet user. There are even worms and viruses who use the File sharing option to spread in the Internet. Anyway, no matter whether you need it for some reason or

  1. Smart Card System

    Running under MEDEA (Microelectronic Development for European Applications), the Eureka program or pre-competitive collaborative research and development, MASSC brings together SGS-Thomson Microelectronics, Bull CP8, De La Rue Card Systems, Dyade and OscarD. The partners' areas of expertise cover the full spectrum of components and system levels required to meet the

  2. importance of data security and data safety

    * Describe the role of email when using internet communications. You can send email to an individual or to a group of people at the same time, you can create mailing list so that you can write a message and send it automatically to number of people.

  1. Flexible Architectures in Communication Security Application

    The baseline implementation of each algorithm is quite efficient. We obtained optimized implementations of each of the AES finalists from the inventors of the algorithms. 3DES, Blowfish, and RC4 were all developed by Eric Young of CryptSoft [11]. CryptSoft's code is quite efficient, as a result, it has found its

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    The fully computerized system would also mean that all parts of the system would be compatible with one another. Possible software To make my system it would be possible to use various pieces of software. There are 3 types of software that I could use.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work