Hacking - gain unauthorised access to data/to a computer system., Viruses - a program which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data., Malicious Damage - when a person intentionally sets out to corrupt or delete electronic files, data or software programs e.g. White Collar Crime, Accidental Damage - when a person unintentionally corrupts or deletes electronic files, data or software programs., Reputation - Loss of data leading to damage to company’s reputation, Prosecution - Loss of data leading to fines or prosecution / GDPR , Hardware Failure - Hardware failure leading to a loss of data, ID Theft - Leading to personal losses / fraud, Trojan - a program designed to breach the security of a computer system while ostensibly performing some innocuous function., Worm - a standalone malware computer program that replicates itself in order to spread to other computers., Spyware - software that enables a user to obtain information about another's computer activities by transmitting data from their hard drive., Botnets - a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam., Malware - software which is specifically designed to disrupt or damage a computer system., Keylogger - a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.,

Dangers of using computers to manage personal data

Bestenliste

Visueller Stil

Einstellungen

Vorlage ändern

Soll die automatisch gespeicherte Aktivität wiederhergestellt werden?