Professional Documents
Culture Documents
1. Introduction
The incredibly fast development of the Internet has brought many benefits both to
consumers and businesses.
However, it has also provided criminals or misguided individuals with great opportunities
for crime or 'mischief'.
The Internet is not only used by innocent members of the public, but also by fraudulent
traders, software pirates, hackers and con-artists, to name but a few.
You have probably heard of "hackers" who nearly started World War III (or was that the
film WarGames?) or others who gave themselves massive pay rises. Or how about the
'Love Bug' virus that crippled many multinational companies' e-mail systems? These are
just some of the problems that networked computers can bring!
This mini website concentrates on hacking. To find out more, use the links on the left to
navigate through the pages.
2. What is a hacker?
A hacker is a person who breaks codes and passwords to gain unauthorised entry to
computer systems. More>
Hackers can do an enormous amount of damage if they break into a computer system.
For some people, the challenge of breaking the codes is irresistible and so precautions
have to be taken.
Stand-alone computers are usually safe as there is no connection for the hackers to break
into. Computers which form part of networks or those with external links, such as attached
modems, are in danger from hackers.
Many hackers often don't intend to cause damage or steal data, they just enjoy the
challenge of breaking into a system. However, in some instances the hacker's purpose
could be to commit fraud, to steal valuable data or to damage or delete the data in order to
harm the company.
It might be hard to believe, but most hacking is carried out by employees with a grudge or
those who want to 'make a quick buck'. They have insider knowledge of passwords and
User IDs which makes it easy for them.
Note on the word "hacker":
For at least 20 years this description has been criticised by the 'true' hacker, who feels
they should be known as a 'cracker'
3. Data Theft
Data is often the most valuable resource any business has. The cost of creating data
again from scratch can far outweigh the cost of any hardware or programs lost.
6. Legislation
Hacking, computer fraud and computer viruses are all relatively new crimes that
established English laws were not designed to deal with. For example, under existing laws
a hacker could only be prosecuted for the theft of electricity.
To deal with these new crimes, a law was introduced in 1990 called 'The Computer
Misuse Act'
Under this law, the following offences could be dealt with:
1. Hacking - unauthorised access to any program or data held in a computer. Penalty is a
maximum fine of 2000 and a six month prison sentence.
2. Computer fraud and blackmail. Penalty is an unlimited fine and a maximum five year
prison sentence.
3. Viruses - unauthorised modification of the contents of a computer, impairing the
operation of any program or reliability of data. Penalty is an unlimited fine and a maximum
five year prison sentence.
MALICIOUS SOFTWARE
1. Introduction
Computer Virus - this is a phrase coined from biology to describe a piece of software that
behaves very much like a real virus (only it spreads from computer to computer rather than
people!).
The following pages will introduce you to what a computer virus is and what can be done
to deal with them.
Use the menu on the left-hand side to navigate through the pages.
2. What is a virus?
A Computer Virus is a software program that is designed to copy itself over and over again
and to attach itself to other programs.
In the early days of personal computing (1980's) some of the people who created viruses
had a certain misplaced sense of humour. For example, there was a virus that caused all
the characters on screen to drop into a heap at the bottom of the display. Very annoying,
but relatively harmless.
However, quite soon some really nasty versions came out that were deliberately designed
to corrupt and delete your files as well as trying to copy itself everywhere.
Viruses can cause an immense amount of time wasting and financial loss for people and
businesses. For example, the "Melissa" virus was so effective in spreading itself that many
huge corporations had to shut down their email systems until the virus could be contained.
It is important to understand that viruses do NOT damage the hardware. They affect the
data and programs stored on your computer.
email attachments
infected web pages
downloading a file from a web page
Another way is to load an infected file into your computer from some kind of storage
device:
memory stick
CD/DVD
Note: The CD and DVD products from reputable companies are extremely unlikely to
contain a virus. It is the personal 'burned' ones that are a potential problem.
It is also possible to pick up a computer virus through what is known as 'peer to peer' file
sharing networks. These are internet networks that are used by people to share files
5. Preventing infection
Viruses can be prevented by taking sensible precautions including:
- Using anti-virus software to scan your system daily or weekly
- Scanning all incoming e-mails
- Not opening attachments from people that you don't know (or attachments which look
suspicious)
- Unless you are using a reputable site, not clicking on web site offers which look too good
to be true, for example 'download this amazing game for free'
- Use special filtering software to prevent automatic downloads of computer programs
- Not allowing people to load applications or use floppy disks/memory sticks on your
system
- Not using software that has been copied
- Backing up your system regularly so you can recover your data with clean copies
6. Trojans
As the internet has grown and millions of people are online, so has the development of
other types of software pests such as 'Trojan software'
A Trojan is an application that appears to do something useful such as a computer game
(which is why you loaded it on to your computer in the first place) but quietly, behind the
scenes it is doing something with ill-intent.
A trojan may:-
Log all your keystrokes and then send the details to a remote
computer / server. Used to capture your passwords
Allow someone else to take control of your computer whilst you are
online.
Capture screen shots and send them to a remote computer, once
again with the intent of obtaining confidential information such as
financial screen shots.
7. Other pests
Worms
These are a bit like a computer virus but they spread on their own through computer
networks. Their biggest problem is the sheer amount of computer time and bandwidth they
soak up, so making the network slow to a crawl.
Adware / Spyware
These are programs designed to keep track of which adverts you click on and then they
send specific adverts to your browser. Fairly harmless but annoying and hard to get rid of.
8. Legislation
It is against the law to distribute a virus to others.
The law which covers this area is called The Computer Misuse Act (1990). It also covers
various computer crimes such as Hacking, computer fraud as well as the deliberate spread
of viruses.
This law specifies a virus as: 'unauthorised modification of the contents of a computer,
impairing the operation of any program or reliability of data'.
Anyone caught distributing viruses knowingly faces an unlimited fine and up to a five year
prison sentence.
Online crime
1. Introduction
Where there are ways to make money, there will be criminals just waiting to take
advantage.
The growth of the Internet has provided criminals with a whole host of different methods to
try to relieve you of your hard earned cash.
Computer crime is defined as 'criminal activity directly related to the use of computers'. It
could be done in order to:
steal money
steal data or information
steal someone's identity
damage or disrupt someone's system for revenge
cause general havoc for fun
copy software / films / music to avoid paying for it.
Use the menu on the left to work your way through the pages and find out a little bit more
about computer crime.
2. Theft of money
Commerce on the Internet is mainly paid for through the use of credit cards, either
personal or corporate credit cards.
Therefore thieves have been very active in obtaining stolen credit card details to purchase
goods and services over the Internet. This type of crime runs to millions of pounds per
year.
Until recently credit card numbers were printed on supermarket receipts etc, but you may
have noticed that many businesses only print part of the number now. This has been done
to make it harder to steal vital details.
On-line companies can now also check that the address for delivery is the same as the
true credit card owner, making it harder for the thief to use the stolen card.
3. Theft of data
Data / Information is often the most valuable commodity any business has. The cost of
creating data again from scratch can far outweigh the cost of any hardware or programs
lost. Loss of data can have various consequences, some of which can be seen below.
Data can be stolen either by physical theft of hardware, or through unauthorised access to
the system e.g. hacking.
4. Fraud
Fraud means trying to trick someone in order to gain an advantage.
For your GCSE course, we are mainly concerned with fraud which takes place using ICT.
There are a number of other cases where computer fraud can be committed in order to
make some kind of financial gain. Some of the most common forms of computer fraud
include:
5. Piracy
Copying software, music or film DVDs is called 'software piracy'.
I bet most of us have copied a game to give to a mate or have heard a cool track and
downloaded it from the Internet for free.
Although you don't think you are causing anyone any harm, in fact you are!
Every piece of software, music CD or film DVD that you copy, or get a copy of, means that
the developers are losing the profit from that item.
'Who cares, they are rich enough' I hear you say.
Well, once you have finished that computer game and you want another one to play, you
will expect it to be there for you to buy or get a copy again from your mate.
By not paying for the item in the first place, the company will have less profit to reinvest in
making the next one that you will want to get your hands on.
Not only does piracy mean that the companies have less profit, it also means that there
are fewer jobs as they try to keep their costs down.
It has been estimated that if piracy could be cut by just 10%, then an extra 40,000 jobs
could be created in the IT industry.
6. Viruses
We hear so much about computer viruses, but what are they really?
A computer virus is a software program that can make copies of itself, that can cause mild
7. Hackers
A hacker is a person who breaks codes and passwords to gain unauthorised entry to
computer systems. (Some would say that this refers to a 'cracker')
Hackers / Crackers can do an enormous amount of damage if they break into a computer
system.
For some people, the challenge of breaking the codes is irresistible and so precautions
have to be taken.
Stand-alone computers are usually safe as there is no connection for the hackers to break
into. Computers which form part of networks or those with external links, such as attached
modems, are in danger from hackers.
Many hackers often have no specific fraudulent intent, but just enjoy the challenge of
breaking into a system. However, in some instances the hacker's purpose could be to
commit fraud, to steal commercially valuable data or to damage or delete the data in order
to harm the company. It is often carried out by corrupt employees or employees with a
grudge. They may have insider knowledge of passwords and User IDs which makes it
easy for them.
The extent of hacking is difficult to assess, much of it is only discovered by accident.
8. Protecting yourself
Businesses can use a range of physical methods to protect their systems and data. Some
of these include:
rooms
Posting security guards
Security locks, smart cards
Keeping sensitive data on stand-alone machines instead of networks
Using alarm systems and video cameras
Education of users
not to tell anyone else their user names and passwords
to choose sensible passwords
to change passwords regularly
The business can also use software to help protect their systems. Some of these methods
include:
Data encryption - data is 'scrambled' before being transmitted through a network. Only the
authorised recipient has the 'key'.
Firewalls - software to block access from outside (and to prevent data being sent out in
some cases)
Activity logs, passwords and levels of security.
9. Legislation
To deal with crimes such as hacking, computer fraud and viruses, legislation was passed
1990 called 'The Computer Misuse Act'.
Under this law, the following offences could be dealt with:
1. Hacking - unauthorised access to any program or data held in a computer. Penalty is a
maximum fine of 2000 and a six month prison sentence.
2. Computer fraud and blackmail. Penalty is an unlimited fine and a maximum five year
prison sentence.
3. Viruses - unauthorised modification of the contents of a computer, impairing the
operation of any program or reliability of data. Penalty is an unlimited fine and a maximum
five year prison sentence.
Hacking
Hacking is where an unauthorised person uses a network, Internet
or modemconnection to gain access past security passwords or other security
to see data stored on another computer. Hackers sometimes use software
hacking tools and often target, for example, particular sites on the Internet.
Data misuse and unauthorised transfer or copying
Copying and illegal transfer of data is very quick and easy using online
computers and large storage devices such as hard disks, memory
sticks and DVDs. Personal data, company research and written work, such as
novels and textbooks, cannot be copied without the copyright holder's
permission.
Copying and distributing copyrighted software, music and film
This includes copying music and movies with computer equipment and
distributing it on the Internet without the copyright holder's permission. This is
a widespread misuse of both computers and the Internet that breaks copyright
regulations.
Email and chat room abuses
Internet services such as chat rooms and email have been the subject of many
well-publicised cases of impersonation and deception where people who are
online pretend to have a different identity. Chat rooms have been used to
spread rumours about well known personalities. A growing area of abuse of the
Internet is email spam, where millions of emails are sent to advertise both
legal and illegal products and services.
Pornography
A lot of indecent material and pornography is available through the Internet
and can be stored in electronic form. There have been several cases of
material, which is classified as illegal, or which shows illegal acts, being found
stored on computers followed by prosecutions for possession of the material.
Identity and financial abuses
This topic includes misuse of stolen or fictional credit card numbers to obtain
goods or services on the Internet, and use of computers in financial frauds.
These can range from complex well thought out deceptions to simple uses such
as printing counterfeit money with colour printers.
Viruses
Viruses are relatively simple programs written by people and designed to cause
nuisance or damage to computers or their files.
How to prevent computer misuse
The Computer Misuse Act (1990)
This was passed by Parliament and made three new offences:
1.Accessing computer material without permission, eg looking at someone
else's files.
2.Accessing computer material without permission with intent to commit
further criminal offences, eg hacking into the bank's computer and wanting
to increase the amount in your account.
3.Altering computer data without permission, eg writing a virus to destroy
someone else's data, or actually changing the money in an account.
The Data Protection Act
This was introduced to regulate personal data. This helps to provide protection
against the abuse of personal information. Find out more about the Data
Protection Act.
Copyright law
This provides protection to the owners of the copyright and covers the copying
of written, musical, or film works using computers. FAST is the industry body
which is against software theft. You can find out more about it in
the Copyright section.
There have been cases where laws such as Copyright have been used to crack
down on file sharing websites or individuals who store and illegally distribute
copyrighted material, eg music. There is a massive problem with many people
around the world obtaining copyrighted material illegally.
Close down chat rooms
Some chat rooms have been closed down due to abuses, especially where
children are vulnerable. Some have moderators who help to prevent abuses.
Advice about sensible use is important; especially to never give personal
contact details or arrange meetings without extreme caution.
Reduce email spamming
This may be reduced by:
never replying to anonymous emails
setting filters on email accounts
reporting spammers to ISPs, who are beginning to get together to blacklist
email abusers
governments passing laws to punish persistent spammers with heavy fines
Regular backups and security
Just making something illegal or setting up regulations does not stop it
happening. Responsible computer users need to take reasonable steps to keep
their data safe. This includes regular backups and sufficient security with
passwords.
Viruses
Viruses are written by malicious programmers who wish to cause problems for
other computer users.
The primary source of infection these days are emailattachmentsfollowed
by illegal software and infected files from the internet. If you have up to
date anti-virus software installed this will immediately warn you of any
not allowing other users to use their ownmemory stick on your system
only downloading files from reputable web sites
avoiding software from unreliable sources
Anti-virus software can inspect computer files and email attachments for
viruses and remove or quarantine any which are found.
It is good practice to backup your data regularly. If a virus does damage your
data, you can restorethe damaged files from backup.
pornography, con people out of money, invade peoples privacy with unwanted
advertising, and make it easier for criminals to organise their activities.
However, it is not the case that anyone can post anything over the internet. For
example:
the Chinese government heavily censors its citizens' use of the internet
libel (written defamation of someone's character) laws apply equally well to the
internet
copyright law is being actively used to suppress websites, for example, many file
sharingwebsites have been shut down over the years.
Confidential data
Many people are concerned about organisations storing personal, confidential
details on computer. A student may want to know:
What information the school stores about them?
Who has access to this information, eg which members of staff?
The section on the Data Protection Act gives more information on this topic.
Internet security
There are a number of ways the public are made to feel safer when using the
internet:
encryption of sensitive data, making it unreadable until it reaches its destination
and is decrypted
passwords and access level restrictions
firewalls (protection from hackers)
anti-virus software
tough penalties for offenders under the Computer Misuse Act
Computerisation of retail
Loyalty cards offer regular customers discounts and this puts smaller shops under
threat.
These cards enable the stores to build huge databases of customer preferences.
Their personal details can be used in direct mail-shots for marketing goods.
Internet and digital TV shopping means we can shop without leaving home.
The growth of large stores and internet shopping has inevitably affected small
shops:
more small shops may go out of business
local town centres are threatened by the closure of small shops
Other concerns
Increased dependency on IT
What happens if a computer breaks down? We are now so dependent on IT for
our lifestyles that we cannot survive without them. Businesses stand to lose a
lot of money if their IT systems fail. To avoid this they may have to have one or
even two backup computer systems.
Viruses
Computer systems can break down when viruses corrupt data. Read
the Viruses study guide for more information on this topic.
Entertainment
Activities we do in our leisure time are increasingly dependent on information
technology, such as:
watching digital or satellite TV
watching DVDs, Blu-ray and online videos
playing computer games
Online booking
Online bookings are growing as fast as online shopping. Theatre, cinemas,
concerts, air tickets, train tickets, hotels and package holidays are all available
on the web, often at cheaper prices than buying them from high street shops.
Bookings can be made across the world by internet connection.
Advantages
Instantly find out availability.
Book out of office hours.
Disadvantages
Risk buying from a website setup to scam money out of customers, ie the tickets
never come.
Even when buying from genuine websites, the tickets may not arrive in the post in
time (where confirmation email cannot be used).
Websites may not be able to cope with high demand (making them inaccessible).
Loyalty cards
The larger stores offer customers loyalty cards. When the customer shops at
the store they're awarded a set number of points depending on how much they
spend. The loyalty card stores their points. One point is commonly worth 1p
with a point awarded for each pound spent.
Points can be converted into vouchers that provide discounts on products or
services.
Each customers' loyalty card has a unique card number linked to
adatabase which stores information about them (provided by the customer
when they signed up) and their purchases.
visits the shop the card is swiped, reading the unique number. This identifies
the customer whose points total, stored in the database, is then updated. The
tills use barcodes to identify each item bought.
Targeting customers
When a customer signs up they provide basic details such as their name and
address.
Loyalty cards provide companies with information about customer spending
habits. This information can be used to target customers generally or
specifically.
Product placement
If customers frequently buy bread and milk together, these items may be put
near each other for customer convenience or farther apart, forcing the
customer to walk through the entire store (in the hope they buy additional
items along their way).
Vouchers
If a customer frequently buys beans, vouchers offering money off beans will be
sent to them (further increasing their loyalty), rather than for products they
rarely buy.
Mailing lists
Can be used to send out tailored advertisements. For example, someone who
regularly buys garden magazines might be sent special offers on garden
products.
New stores
When customers sign-up they provide their address. This information can be
used to see where the customers come from and identify opportunities for new
stores.
Electronic Commerce
Electronic Commerce or e-commerce is the selling and buying of goods or
services over the internet.
E-commerce has both advantages and disadvantages for businesses and
customers.
Cost effective save on staffing a physical shop (or shops) and the associated costs,
eg rent, electricity, gas, water etc.
Slow adoption - companies whose competitors already have an online presence may
find it hard to gain market share.
Greater choice - customers are no longer limited to shops nearby and can even buy
from abroad.
Product details - greater wealth of information available online than what a member
of staff is able to provide in-store.
Fraud - a website may take your money, but have no intention of delivering the
goods.
Stock issues - the product may be out of stock, or if ordered and later found to be
out of stock, a substitute product may be sent instead.
Online banking
All high street banks offer online banking and some banks are exclusively
online with no high street branches.
Services
Customer benefits
Convenience - banking when it suits them, 24 hours a day, 365 days a year from any
computer with an internet connection.
Higher interest rates - savings banks make through reduced staffing, fewer
premises and increased automation mean they can offer higher interest rates.
Increased market awareness - visit all the banks and find out what interest rates
they offer online.
Customer concerns
The closure of small, local branches or reductions in opening hours.
The security of online banking, specifically hacking and credit card fraud.
Staffing reductions.
Advantages
Convenience - shop from any computer with an internet connection any time
while avoiding the need to travel, pay for parking, queue in-store etc.
Greater variety - more shops online than any high street or shopping centre.
Cheaper goods - increased competition between retailers (for some on a global
scale) brings down prices.
Accessibility - those with a disability that limits their mobility can choose to have
goods delivered.
Comparability - using the internet it's easy to research products or services very
thoroughly, comparing prices and product details in order to get the best deal.
Disadvantages
Security concerns surrounding payment by credit card over the internet.
Not being able to physically inspect the goods before purchase.
Goods getting damaged during transport.
Goods not arriving in time or at all.
Concerns over what information retailers are storing about customers, eg buying
habits.
Online accounts
Jump media player
Media player help
Out of media player. Press enter to return or tab to continue.
How IT helps Manchester City Football Club with their ticketing and safety
systems
The first time a customer buys goods from a retailer online they are asked to
create an account. The sign-up process typically asks for:
email address
password
telephone number
delivery address
billing address
payment details
The details stored in the account are protected by the customer's email
address (which acts as their username) and password. Storing this information
means returning customers do not need to re-enter it.
Security
Goods are typically paid for using a credit or debit card. During the payment
process communication between the retailers website and the bank takes
place over Secure Sockets Layer (SSL), a technology that encrypts
(scrambles) data.
PROTECTING DATA
1. Introduction
You might think that the most valuable item a company owns is its computers. Although
2. Employees
If you were asked to take a guess on the most likely cause of data loss, you would
probably say, 'hacking' or 'theft of equipment'. You would be wrong. The single biggest
cause of loss or damage to data is from employees or data users such as yourself.
Carelessness
Occasionally an employee might be tempted to steal company data. They may have been
offered money by another company to get hold of the data - this is called 'industrial
espionage'
The employee might want to steal data because they are planning to set up their own rival
business shortly.
Data Damage
An employee might hold a grudge against their employee, maybe they don't like their boss
or maybe they have heard they are about to lose their job.
It has been known for people in this situation to damage or destroy files to 'get their own
back'.
3. Other people
Although employees are the most likely to be the ones who cause damage or loss to data,
a business has to be mindful about the risks from other people outside the business.
Hackers
A hacker is a person who breaks codes and passwords to gain unauthorised entry to
computer systems.
Many hackers often don't intend to cause damage to data, but just enjoy the challenge of
breaking into a system.
However, in some instances the hacker's purpose could be to commit fraud, to steal
commercially valuable data and sell it to another company or to damage or delete the data
in order to harm the company.
Viruses
A Computer Virus is a computer program that is designed to copy itself repeatedly and
attach itself to other computer programs.
In the early days of personal computing (1980's) some of the people who created them did
it as a 'joke'. For example, there was a virus that caused all the characters on screen to
drop into a heap at the bottom of the display. Very annoying, but relatively harmless.
However, quite soon some really nasty versions came out that were deliberately designed
to corrupt and delete your files as well as trying to copy itself everywhere.
Viruses can cause an immense amount of time wasting and financial loss for people and
businesses.
4. Physical risks
Besides people, there are plenty of other ways that data can be lost or damaged. Here are
a few more to think about.
Fire, floods and lightning damage
Although thankfully a rare occurrence, fires and floods do happen. They can cause
immense damage and even total destruction of the computer equipment.
If you have been daft enough not to make a back up and store it somewhere other than
the office, then it is pretty likely that all of your data is sitting on the now damaged machine
and cannot be retrieved.
Theft of equipment
Computers are expensive, attractive items and can be a prime target for thieves.
If your computer is stolen and you haven't made a back up of your data then all of your
hard work will end up walking out of the door with the thief.
Scratches on the hard disk
The platters inside a hard disk spin very quickly whilst a 'head' hovers less than a hair's
width above them, reading the data.
If you don't shut your machine down properly this head crashes onto the spinning platter
causing scratches.
If a scratch occurs just at the point your data is stored, it can be damaged and you might
not be able to access it.
5. Back-ups
It's common sense to make copies of your work, but you would be amazed at how few
don't do this.
Whilst you are working, you should remember to save your work every 5 minutes or so. It
doesn't take a moment to press the 'save' button.
If you are sensible, you should also save your work as different versions, just in case your
work becomes corrupted or you delete something by accident. You can then go back to an
earlier version. O.K. you might have lost some work, but you won't have lost it all.
Besides backing up on the system you are using, you should also make a regular back up
onto another piece of hardware, preferably something that is removable e.g. removable
hard disk, magnetic tape, DVD-RW. This removable back up should be stored off site, so
that if there were a fire, flood or theft, you would still be able to get hold of a copy of your
data and reinstall it.
Backing up should use the 'grandfather, father, son' method. The daily or 'Son' backups
are rotated on a daily basis with one graduating to Father status each week. The weekly or
Father backups are rotated on a weekly basis with one graduating to Grandfather status
each month.
6. Physical protection
As you have seen, there are many different ways that you or a business can lose valuable
data. With a little bit of planning and thought however, the risks can be reduced or even
eliminated.
There are many things you can do to make your equipment more secure:
- Lock the room when not in use
- Use swipe cards or keypads to activate locks
- Bolt computers to the desk
- Use special pens to mark your postcode onto the computer case
- Keep windows shut - especially if on the ground floor. Use bars.
- CCTV video cameras
- In large firms, security guards
Note: in an exam, you would generally only give one example from the list above and then
go on to discuss the other methods below.
Unless specifically asked to discuss physical security, don't just list the points from this
section.
7. Software protection
Firewall
A firewall is a program or hardware device that filters the information coming through the
Internet connection into your personal computer or into a company's network.
It is set up to allow mainly one way access, i.e. you can go out onto the Internet and
access pages, but it checks everything coming back against a set of rules. If the data
coming back is from an unauthorised source, then it is blocked.
You may have heard people saying, 'I can't get on that site at school because it's been
blocked'; that is the firewall in action.
8. Software protection
Anti-virus software
This is special software which is used to detect viruses and to limit their damage by
removing them.
The software tries to detect viruses before they can get access to your computer. If a virus
is detected trying to get through the firewall, the software will give an alert and ask how
you want to respond.
It is important that anti-virus software is updated regularly by going to the manufacturers
site. Although the software was up-to-date when you bought it, within a few weeks, new
viruses will have been released which your software won't know how to detect.
The manufacturers provide downloads to make sure that your software can identify all of
the latest threats.
It is also important to run an 'anti-virus' scan regularly, just to make sure that there aren't
any viruses lying dormant on your system.
9. Software protection
User IDs and Passwords
When you log onto your network at school, you have to type in your User ID and
Password. This identifies you to the network as an authorised user.
Any sensible company will ensure that staff need a User ID and Password to gain access
to the system. This should reduce the risk of outsiders being able to get onto the system
and damage data.
People should follow rules when choosing their password:
- passwords should be kept secret at all times
- passwords should not be something that is easy to guess such as pet's name or favourite
football team.
- passwords should include text and numbers or symbols
- passwords should be a reasonable length e.g. over 6 characters
- passwords should be changed regularly
This is a method of scrambling data in such a way that only the people who have the
'secret key' to unlock the message can read it.
This is an example of ordinary text:
Humpty Dumpty sat on a wall.
Humpty Dumpty had a big fall.
This is what an encrypted code for the text would look like:
lj86ik,lj)ay%9w2+m?lsild171724
jkd2f*hkdfh7$171kjfh7d1h4d
You obviously have to keep the "secret keys" safe from prying eyes.
11. Software protection
Audit Log
A very good way of tracing back a problem is for the system to keep an audit log.
This means the computer will record every important event in an 'audit file. It records who
saved what and when. Who deleted records or changed them. For example an audit
record may look like this:User: bigears233
File: TheMostImportantFile.doc
Changed: 3rd January 10:15am
(or Deleted, or Saved).