IT - Unit 1: Threats to Data

studied byStudied by 6 people
0.0(0)
get a hint
hint

Malware

1 / 43

44 Terms

1

Malware

Malicious software that can corrupt or delete data and lead to data theft. Includes viruses, worms, trojans, and spyware.

New cards
2

Hackers

Individuals who gain unauthorized access to computer systems, often misusing data for fraudulent activities.

New cards
3

Phishing

A fraudulent activity where deceptive emails pretending to be reputable companies are sent to obtain personal or financial information.

New cards
4

Accidental damage

Harm to IT systems or data caused by human error, such as dropping a device or accidentally overwriting important files.

New cards
5

File permission

The access rights set to files, including read-only, read/write, and full control permissions.

New cards
6

Access levels

Determining the software, data, and services a user can access, with administrator access being the highest level.

New cards
7

Backups

Creating copies of data and storing them in a secondary location, such as remote backup, using full, incremental, or differential methods.

New cards
8

Physical access controls

Measures to prevent unauthorized users from accessing IT systems, such as access cards, keypad access control, biometric access control, and electronic locks.

New cards
9

Digital certificates

Used to authenticate a user as the owner of a public key, enabling secure communication through public key encryption.

New cards
10

Protocols

A set of rules defining data transmission methods between devices over a network, including security protocols like SSL and TLS for secure data transmission.

New cards
11

Anti-virus software

A utility program to prevent or detect/remove malicious software, requiring regular maintenance and updates, with implications on performance.

New cards
12

Firewalls

Hardware or software that monitors network traffic and blocks suspicious activity, with implications on network performance and inability to prevent internal attacks.

New cards
13

Encryption

The process of converting data into an encoded form to prevent unauthorized access, using symmetric encryption for stored data and asymmetric encryption for data during transmission.

New cards
14

Legislation

Laws implemented to protect data and IT systems, such as the Data Protection Act and the Computer Misuse Act, with codes of practice from professional bodies and the Information Commissioner's Office.

New cards
15

Online services

Services offered through the internet, including retail, financial, education & training, news & information, entertainment & leisure, productivity, and booking systems.

New cards
16

Transactional data

Data collected from sales or purchases, used for purchase records, delivery tracking, and customer behavior analysis, with concerns about hacking and privacy.

New cards
17

Targeted marketing

Advertising products to specific customers based on their likelihood to purchase, with implications on impulse buying and privacy concerns.

New cards
18

Collaborative working

Real-time online collaboration among multiple individuals, using cloud storage, teleworking, and video conferencing, with restrictions to prevent overwriting, security concerns, and dependence on internet connection.

New cards
19

Stock control

Using IT systems to monitor and control stock, enabling automated and JIT stock control, with implications on cost, theft, and reduced need for admin staff.

New cards
20

Data logging

Using sensors and IT systems to monitor and log data, providing accuracy and trend analysis, with concerns about connectivity and sensor calibration.

New cards
21

Data analysis

Using IT systems to spot patterns, trends, and make predictions, facilitating data conversion, but requiring accurate input and protection against data theft.

New cards
22

General office tasks

Using IT systems for document production, note writing, finance management, communication, and scheduling, improving efficiency and task range, but requiring technical skills and IT support.

New cards
23

Creative tasks

Using IT systems for CAD, graphics design, and music/film editing, facilitating editing, sharing, but requiring large storage capacity and facing piracy issues.

New cards
24

Advertising

Using IT systems for online, print, and video advertising, targeting customers, but facing issues like spam and phishing emails.

New cards
25

Manufacturing

Using IT systems for Computer-Aided Manufacturing, ensuring consistency, higher product standards, and cost savings, but leading to job redundancies and high implementation costs.

New cards
26

Security

Using IT systems for alarm systems, security cameras, and RFID sensors, reducing security staff and improving security, but raising privacy concerns and false sense of security.

New cards
27

Poor user experience

Negatively impacting employee productivity due to difficulty of use, poor performance, limited availability, or lack of accessibility.

New cards
28

Business needs

IT systems help meet employee needs by making jobs easier, more efficient, and safer, and meet customer needs by improving communication and service tracking.

New cards
29

Initial cost

The high cost of purchasing new IT systems and training staff, but long-term cost savings through reduced staff requirements.

New cards
30

Implementation time

The time required for delivery, testing, and installation of IT systems, leading to potential business downtime and reputation damage.

New cards
31

IT system replacement/integration

Downtime and teething problems during system replacement or integration, impacting business financially and reputationally.

New cards
32

Productivity support

IT systems allow longer business hours and time savings, but can also lead to distractions and poor productivity if systems fail.

New cards
33

Changing working practices

IT systems enable flexible work but increase expectations of availability, requiring better technical skills and ongoing training.

New cards
34

User support

Necessary for productive use of IT systems, but expensive for businesses to provide.

New cards
35

Security threats

Businesses need to protect IT systems from threats to avoid fines under data protection acts, incurring additional expenses.

New cards
36

Primary data

Data gathered through original research by the organization or individual, more up-to-date, relevant, and reliable.

New cards
37

Secondary data

Data gathered by someone other than the user, cheaper, quicker to obtain, and not affected by organizational bias.

New cards
38

Data reliability

Complete and accurate data, with secondary data sourced from trustworthy sources.

New cards
39

Survey methods

Questionnaires, focus groups, and interviews used to gather information for statistical analysis or personal information.

New cards
40

Data accuracy

Ensuring data is correct to avoid garbage in, garbage out (GIGO) situations, using validation and verification techniques.

New cards
41

Data organization

Storing data in a structured database and using queries to extract and sort data based on specific criteria.

New cards
42

Numerical modeling

Using mathematical calculations to simulate real-life systems, facilitating trend analysis and predictions.

New cards
43

Data presentation

Tabular or graphical representation of data, with tabular format for precise data and detail, and graphical format for interpretation and trend spotting.

New cards
44

User interface

Design considerations for interfaces, including easy navigation, accessibility, error reduction, intuitiveness, functionality, performance, and compatibility.

New cards

Explore top notes

note Note
studied byStudied by 2 people
Updated ... ago
4.0 Stars(1)
note Note
studied byStudied by 7 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 21 people
Updated ... ago
4.5 Stars(2)
note Note
studied byStudied by 82 people
Updated ... ago
4.3 Stars(3)
note Note
studied byStudied by 8 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 1 person
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 11 people
Updated ... ago
5.0 Stars(1)
note Note
studied byStudied by 33265 people
Updated ... ago
4.9 Stars(62)

Explore top flashcards

flashcards Flashcard31 terms
studied byStudied by 19 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard54 terms
studied byStudied by 26 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard45 terms
studied byStudied by 184 people
Updated ... ago
5.0 Stars(4)
flashcards Flashcard48 terms
studied byStudied by 221 people
Updated ... ago
4.7 Stars(3)
flashcards Flashcard41 terms
studied byStudied by 1 person
Updated ... ago
4.0 Stars(1)
flashcards Flashcard35 terms
studied byStudied by 13 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard170 terms
studied byStudied by 16 people
Updated ... ago
5.0 Stars(1)
flashcards Flashcard168 terms
studied byStudied by 1895 people
Updated ... ago
4.6 Stars(5)