We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Threats to Customer Data Essay Sample

essay
The whole doc is available only for registered users OPEN DOC
  • Pages:
  • Word count: 876
  • Category: data

Get Full Essay

Get access to this section to get all help you need with your essay and educational issues.

Get Access

Threats to Customer Data Essay Sample

In this century there more and more computers being made and customised by everyone but there are many risks to these computers which can damage them.

These are the threats to the customer’ data

4 threats. Ways to counter them. Assess! Computer misuse act and their effectiveness.

The purpose of data protection legislation is to ensure that personal data is not processed without the knowledge.

Viruses

Hackers

Spy ware

Hardware failure

Human error

Dishonest employees

Natural disasters

Theft

Terrorism

Flood and Fire

Viruses

A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the user. The term “virus” is also commonly but also used to refer to other types of malware, ad ware and spyware programs that do not have the ability to create itself again. A true virus can only spread from one computer to another when its host (some form of code) is taken to the target computer, for instance because a user sent it over a network or the Internet, or can increase their chances of spreading to other computers by infecting files on a network file system or a file system that is accessed by another computer.

Viruses are sometimes confused with computer worms and Trojan horses which are like viruses but are technically different, in effect creating a damageable system to allow access to the user’s computer. A worm can spread itself to other computers without needing to be transferred from someone, Worms and Trojans, like viruses, can cause harm to a computer system, functional performance, or networking throughput, when they are made. Some viruses and other malwares are noticeable to the computer user, but most are not easy to find. This makes it hard for the average user to notice, find and disable and that is why specialist anti-virus programs are now made. Today’s viruses may also take advantage of network services such as the World Wide Web, e-mail, Instant Messaging and file sharing systems to spread.

* Getting an antivirus-viruses in the computer are detected by the antivirus and stopped and then removed, it also informs the users if they have entered any suspicious websites and tells us to avoid it or blocks us from it automatically. An antivirus completely removes viruses or other harmful soft wares which is also called malware in computing terms.

* Not using the computer infected-if a computer has been infected by a virus, it’s not safe to continue using the same computer without completely reinstalling the operating system. There are still a number of recovery options that exist after a computer has a virus. These actions depend on severity of the type of virus.

System Restore, which restores the computer and sensitive system files are removed and the computer’s status is back to what it was from when it was bought. Although you will lose all your files completely and will have reinstall everything.

Ways to stop getting infected from virus

* Run your virus scanner frequently.

Hacking or Scamming is when some unauthorised person attempts to break into someone’s computer systems or accounts on someone else’s website. Programmers for whom computing is its own reward; may enjoy the challenge of breaking into other computers but do no harm to anyone could be given another chance but if he hacks into someone’s system and takes their personal information or give them viruses he could be prosecuted if caught .

There are many ways to stop hacking we can find out more information about hacking and what can help you to prevent from being hacked.

* We should never give out personal information and never enter passwords to suspicious emails.

The firewall will block out any unwanted spam and monitor what’s attempting to get in our systems.

Hacking or scamming percentages are rising but by knowing everything about them or how to prevent them we can reduce our chances of getting hacked.

Prevent spywares to enter our system

Don’t run unnecessary network services – When installing systems, any non-essential features should be disabled. If a feature is installed but not actively used, it is less likely to be updated regularly, presenting a larger security threat. Also, allow only the software’s you need there because other software’s could give you many risks.

Norton Internet Security is well known software which is secure and protects us from going on websites which aren’t safe.

Implement a firewall – A firewall is a kind of like a barrier that keeps hackers and viruses out of computer networks. Firewalls restrict network traffic and allow only authorized data to pass through and tell us if we have any risks also if we have our firewalls turned off it gives us warnings to turn it on.

The threats can be stopped depending on just our actions for example, downloading files from unknown sites and poor habits of opening up strange email attachments and there are many other mistakes made by people which give more options to the hackers or make it easier for them to hack in.

We can write a custom essay

According to Your Specific Requirements

Order an essay

You May Also Find These Documents Helpful

Roles and responsibilities of data users

In order to successfully gather data from the users, conducting an interview must be a good idea. Hence that may insufficient as users may not able to describe everything by themselves as the ideal meaning may not portrays only by words. So that it is better if the user can be observed while they use an interface they currently use which may portrays much information....

Data Handling - ICT

Choice of Problem When asked to think of ideas to base my ICT course work on I came up with the following; * Make over salon * Modelling agency * School health centre * Job centre * A tracing family trees agency I decided on the job centre for a number of reasons; * This idea was original; no one else in my year was...

Estate Agents - Problems of a Paper...

Introduction An estate agent based in a paper-based office comes across a lot of problems. It necessary to solve these problems and try to bring the system of the basic system and improve to be more efficient and more reliable in a working area. The firm is in an area that is equally part urban and part rural. Further more because of this area people...

Database Analysis and Database Design Project -...

Moving Images operates a DVD library. The library has a large number of titles, each title having at least one copy. Each title falls into a specific category some of these are adventure, thriller, fantasy, action or education. (There are others) All titles are loan only to registered members of Moving Images. Information is keep about the members is only personal details including name, address...

The ICT Theory

Data All the data for the new system will have to be collected together. All the names, addresses and phone numbers of all the client's contacts will need to be put together so that it will be easier to input the data to the new system. To collect the data together there will need to be a data sheet designed. One of the client members...

Get Access To The Full Essay
icon
300+
Materials Daily
icon
100,000+ Subjects
2000+ Topics
icon
Free Plagiarism
Checker
icon
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
Sorry, but only registered users have full access

How about getting this access
immediately?

Become a member

Your Answer Is Very Helpful For Us
Thank You A Lot!

logo

Emma Taylor

online

Hi there!
Would you like to get such a paper?
How about getting a customized one?

Couldn't Find What You Looking For?

Get access to our huge knowledge base which is continuously updated

Next Update Will Be About:
14 : 59 : 59
Become a Member