• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Threats to customer Data

Extracts from this document...


Threats to Customer Data In this century there more and more computers being made and customised by everyone but there are many risks to these computers which can damage them. These are the threats to the customer' data 4 threats. Ways to counter them. Assess! Computer misuse act and their effectiveness. The purpose of data protection legislation is to ensure that personal data is not processed without the knowledge. Viruses Hackers Spy ware Hardware failure Human error Dishonest employees Natural disasters Theft Terrorism Flood and Fire Viruses A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the user. The term "virus" is also commonly but also used to refer to other types of malware, ad ware and spyware programs that do not have the ability to create itself again. A true virus can only spread from one computer to another when its host (some form of code) ...read more.


* Getting an antivirus-viruses in the computer are detected by the antivirus and stopped and then removed, it also informs the users if they have entered any suspicious websites and tells us to avoid it or blocks us from it automatically. An antivirus completely removes viruses or other harmful soft wares which is also called malware in computing terms. * Not using the computer infected-if a computer has been infected by a virus, it's not safe to continue using the same computer without completely reinstalling the operating system. There are still a number of recovery options that exist after a computer has a virus. These actions depend on severity of the type of virus. System Restore, which restores the computer and sensitive system files are removed and the computer's status is back to what it was from when it was bought. Although you will lose all your files completely and will have reinstall everything. ...read more.


Prevent spywares to enter our system Don't run unnecessary network services - When installing systems, any non-essential features should be disabled. If a feature is installed but not actively used, it is less likely to be updated regularly, presenting a larger security threat. Also, allow only the software's you need there because other software's could give you many risks. Norton Internet Security is well known software which is secure and protects us from going on websites which aren't safe. Implement a firewall - A firewall is a kind of like a barrier that keeps hackers and viruses out of computer networks. Firewalls restrict network traffic and allow only authorized data to pass through and tell us if we have any risks also if we have our firewalls turned off it gives us warnings to turn it on. The threats can be stopped depending on just our actions for example, downloading files from unknown sites and poor habits of opening up strange email attachments and there are many other mistakes made by people which give more options to the hackers or make it easier for them to hack in. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    Principles of Computer Networks

    3 star(s)

    * Compared to a star topology it performs a lot better under heavy load. * Network server is not required to manage the network. Token Passing Token passing is the method used by nodes to send and receive data in a network.

  2. Different ways of data capture


  1. Smart Card System

    If the access list is outbound, after receiving and routing a packet to the outbound interface, the software checks the access list's criteria statements for a match. If the packet is permitted, the software transmits the packet. If the packet is denied, the software discards the packet.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    ( 0 No work plan is present or is of an inappropriate standard. ( Section 4.1 - Overall time plan TASK WEEK BEGINING Oct Nov Dec Jan Feb Mar 24 31 7 14 21 28 5 12 19 26 2 9 16 23 30 6 13 20 27 6 13

  1. Introduction to Viruses

    > NTFS ADS Viruses Viruses that ride on the alternate data streams in the NT File System. General Virus Behavior Although viruses come in many forms, they all potentially have two phases to their execution, the infection phase and the attack phase.

  2. AQA Computing CPT3

    amount of fuel being dispensed in the current transaction fuelClock Timer 50 milliseconds incrementing 67.23 This will start the timer that shows how much fuel is going through the petrol pump totalToPay Number 0 - 99.99 85.78 This will store the total price to pay for the current transaction pricePerLitre

  1. You need to discuss the advantages and disadvantages of someone in your

    I will also attempt to add a new sale. The database should enable me to delete data I will attempt to delete the record of a customer. I will also delete a sale, thus simulating the way in which a sale could be cancelled.

  2. The Data Protection Act

    data (even manually kept) which can be processed by the relevant equipment are covered by the Act. 2 Protection for All Individuals - Protection is not limited to UK citizens and residents. 3 Granting of Rights - Individuals are granted rights of subject access)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work