Hacking - gain unauthorised access to data/to a computer system., Viruses - a program which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data., Malicious Damage - when a person intentionally sets out to corrupt or delete electronic files, data or software programs e.g. White Collar Crime, Accidental Damage - when a person unintentionally corrupts or deletes electronic files, data or software programs., Reputation - Loss of data leading to damage to company’s reputation, Prosecution - Loss of data leading to fines or prosecution / GDPR , Hardware Failure - Hardware failure leading to a loss of data, ID Theft - Leading to personal losses / fraud, Trojan - a program designed to breach the security of a computer system while ostensibly performing some innocuous function., Worm - a standalone malware computer program that replicates itself in order to spread to other computers., Spyware - software that enables a user to obtain information about another's computer activities by transmitting data from their hard drive., Botnets - a network of private computers infected with malicious software and controlled as a group without the owners' knowledge, e.g. to send spam., Malware - software which is specifically designed to disrupt or damage a computer system., Keylogger - a computer program that records every keystroke made by a computer user, especially in order to gain fraudulent access to passwords and other confidential information.,
Dangers of using computers to manage personal data
This leaderboard is currently private. Click
to make it public.
This leaderboard has been disabled by the resource owner.
This leaderboard is disabled as your options are different to the resource owner.
is an open-ended template. It does not generate scores for a leaderboard.
Log in required
Log in required
More formats will appear as you play the activity.