Hacking - gain unauthorised access to data/to a computer system., Viruses - a program which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data., Malicious Damage - when a person intentionally sets out to corrupt or delete electronic files, data or software programs e.g. White Collar Crime, Accidental Damage - when a person unintentionally corrupts or deletes electronic files, data or software programs., Reputation - Loss of data leading to damage to company’s reputation, Prosecution - Loss of data leading to fines or prosecution / GDPR , Hardware Failure - Hardware failure leading to a loss of data, ID Theft - Leading to personal losses / fraud, Trojan - a program designed to breach the security of a computer system while ostensibly performing some innocuous function., Worm - a standalone malware computer program that replicates itself in order to spread to other computers., Spyware - software that enables a user to obtain information about another's computer activities by transmitting data from their hard drive., Botnets - a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam., Malware - software which is specifically designed to disrupt or damage a computer system., Keylogger - a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.,

Dangers of using computers to manage personal data

Top-lista

Vizualni stil

Postavke

Promijeni predložak

Vrati automatski spremljeno: ?