Introducing
Your new presentation assistant.
Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.
Trending searches
Accessing financial information in order to steal money from individuals or businesses.
Causes harm to organisations reputation and confidential data could be used to blackmail.
Individual data could be used for identity fraud.
Used to gain access to information to steal money from individuals or organisations.
Individuals can also be affected by identity fraud.
Can be used to gain information to help hack an organisation.
Someone who gains unauthorised access to a computer system.
Usually to steal, modify or delete data.
Can be performed through brute force or more technical means.
Emails sent purporting to be a reputable company but really sent by malicious user.
User clicks on link in email and fills in form that appears to be on the businesses website.
Personal data is then sent to malicious user to misuse.
http://www.knowitallninja.com
Corrupt or delete data which could cost an organisation huge sums of money.
Individuals may lose photos with emotional value.
Could also gather information from user for bank/identity fraud.
Individuals and businesses lose important data.
Costs a lot of money to recover. E.g. important lost records, specialist data recovery.
Damaged hardware will need to be replaced.
A computer program that is designed to harm or gain unauthorised access to a computer system.
Examples include:
Through human error we can lose data and damage IT systems. For example:
This is a major reason why businesses backup data.