Threats to Data (CIE IGCSE ICT)

Revision Note

Becci Peters

Expertise

Computer Science

Threats to Data

Threats

  • Hacking: Unauthorised access to computer systems or networks to gain control, steal information, or cause damage
  • Phishing: Deceptive emails or messages that appear to be from trusted sources to trick individuals into revealing personal data
  • Pharming: Manipulation of DNS (Domain Name System) to redirect users to fraudulent websites, often for the purpose of stealing personal data
  • Smishing: Phishing attacks carried out through SMS or text messages
  • Vishing: Phishing attacks carried out through voice calls or VoIP (Voice over Internet Protocol) systems
  • Viruses and malware: Malicious software designed to disrupt, damage, or gain unauthorised access to computer systems or networks
  • Card fraud: Unauthorised use of credit or debit card information for fraudulent purposes

Protection from Hacking

  • Implement strong and unique passwords for accounts and regularly change them
  • Enable two-factor authentication for additional security
  • Regularly update software and operating systems to patch security vulnerabilities
  • Use firewalls and antivirus software to detect and prevent unauthorised access
  • Regularly backup data to ensure its availability and protection against potential data loss

Protection from phishing, pharming, smishing, and vishing attacks

  • Being cautious of unsolicited emails, messages, or calls requesting personal or sensitive information
  • Verifying the authenticity of websites by checking for secure connections (HTTPS) and looking for trust indicators, such as SSL certificates
  • Avoiding clicking on suspicious links or downloading attachments from unknown sources
  • If you are unsure, end communication and establish contact with company or contact to check legitimacy

Protection from viruses and malware

  • Install antivirus software and keep it up to date
  • Download files only from trusted sources and scan them for viruses before opening or executing them
  • Do not visit suspicious websites or click on pop-up ads
  • Regularly update software, including web browsers and plugins, to patch security vulnerabilities

Protection from card fraud

  • Shielding PIN entry at ATMs or payment terminals to prevent shoulder surfing
  • Being cautious when using payment cards online, ensuring secure and trusted websites are used
  • Regularly monitoring bank statements and reporting any suspicious transactions
  • Using secure payment methods, such as chip and PIN or contactless payments, where available
  • Being aware of potential skimming devices on ATMs and payment terminals and reporting any suspicious activity

Worked example

Data stored on a computer system is at risk of being hacked.

a. Explain what is meant by the term hacking. Include in your answer two examples of the effects this can have on the computer system.

[3]

Gaining unauthorised access to a computer system [1]

2 of:

Examples

Can lead to the identity theft of data [1]

Can lead to the misuse of/access to personal data [1]

Data can be deleted [1]

Data can be changed [1]

Data can be corrupted [1]

Place malicious files/software [1]

b. Describe three measures that could be taken to protect the data from being hacked.

[3]

3 of:

Use of firewalls to block unauthorised computer systems [1]

Use of passwords [1]

Use of intrusion detection software/anti-spyware [1]

Use two-factor authentication [1]

Switch off WiFi/computer when not in use [1]

You've read 0 of your 0 free revision notes

Get unlimited access

to absolutely everything:

  • Downloadable PDFs
  • Unlimited Revision Notes
  • Topic Questions
  • Past Papers
  • Model Answers
  • Videos (Maths and Science)

Join the 100,000+ Students that ❤️ Save My Exams

the (exam) results speak for themselves:

Did this page help you?

Becci Peters

Author: Becci Peters

Becci has been a passionate Computing teacher for over 9 years, teaching Computing across the UK helping to engage, interest and develop confidence in the subject at all levels. Working as a Head of Department and then as an educational consultant, Becci has advised schools in England, where her role was to support and coach teachers to improve Computing teaching for all. Becci is also a senior examiner for multiple exam boards covering GCSE & A-level. She has worked as a lecturer at a university, lecturing trainee teachers for Computing.