preview

Nt1330 Unit 3 Assignment 1

Decent Essays

Save this document to your work area. When you have completed it you will upload to your lecturer through the VLE. Your lecturer will demonstrate this in class

Week 2 task 1

Part A – Data Security and internet safety

Use the web links and answer the following questions

1. When you login to the Glasgow Clyde network, why is it important to have a password?
It is important because you don’t want others to being able to access your private files like projects or classwork.

2. What is a computer virus?
A Virus is a piece of malicious code that has the intent to damage your system.

3. Describe 2 types of Computer Virus? Memory Resident Virus is one type, they usually fix themselves inside the computer memory. They get activated every …show more content…

What is meant by the term Malware? Malware refers to any computer program that is designed to do things that are harmful to or unwanted by a computer's legitimate user.

5. What is meant by the term Spyware? Spyware is Software that enables a user to obtain information about another's computer activities by transmitting data from their hard drive.

6. Describe two threats to yourself and your computer Trojan’s are one threat it is a type of malware designed to provide unauthorized, remote access to a user’s computer. Trojan horses do not have the ability to replicate themselves like viruses; however, they can lead to viruses being installed on a machine since they allow the computer to be controlled by the Trojan creator.

Another threat is Phishing, it is the fraudulent practice of sending emails pretending to be from reputable companies in order to lure individuals to reveal personal information, such as passwords and credit card numbers.

7. Give 3 examples of good and bad passwords Good Passwords: A11Black$, $nakesonaPlan3, 3ventH0riz0n. Bas Passwords: password, kitty, canthackme

8. Why might you want to clear your computers …show more content…

How a person’s browsing activity might be tracked? A website places a cookie on your computer to remember certain data so it may run smoother when you return to the site, some government’s collect data to collect data for national security, Google can also collect data to send to marketing companies.

10. What steps might you take to ensure your privacy while browsing? Most browsers have Private browsing, and you can also delete your history to stop others getting access to personal data.

11. How might you know if your financial transactions are secure? Web addresses either begin with http or https. If the address is https, the information you send to it is encrypted and will look like gibberish if intercepted by cybercriminals.

Your browser will use a security symbol or lock to indicate that the browser verifies that the website is a secure site. As seen in the examples below, the look of each browser's symbol can be slightly different, and it is usually located in the address bar.

12. Take the Internet safety quiz and record your score here 7/8 88%

13. List 5 things that you have learnt about computer security
Back up your data on a regular basis to prevent loss of

Get Access