top of page
Search

Protection of Data


Physical Barriers

  1. Real-world protections such as locks on doors, CCTV cameras, and turning off computers at night to prevent unauthorised access.


Password Control of Access

  • Using strong passwords that are at least eight characters long and include:

    • At least one uppercase letter.

    • At least one lowercase letter.

    • A number and a symbol.


Access Levels

  • Ensuring individuals can only access the parts of a system they need.

  • Additional training may be required before granting wider access.

Anti-Virus Software

  • Software designed to delete or quarantine viruses, protecting systems from malware threats.

  • Important: Do not confuse this with generic "virus software."


Firewall

  • Software that monitors and controls the data coming in and out of a network, forming a protective “wall” to guard against hackers, malware, and unauthorised access.


Encryption

  • Converting data into a secret code before sending it over a network or the internet.

  • Ensures intercepted data cannot be understood.


Backup and Recovery

  • Backup: Creating a copy of important data in a separate location to protect against corruption or accidental deletion.

  • Recovery: Replacing damaged or lost data by restoring it from the backup.


Personal Safety

  • Use security settings on social networking platforms to safeguard personal details and reputation.

  • This ensures private information remains inaccessible to malicious individuals.


Identity Theft

Identity theft occurs when someone uses another individual’s personal details to impersonate them. This could involve:

  • Setting up fake accounts.

  • Accessing bank accounts or making fraudulent purchases.

Prevention: Keep personal details private, especially on social networking sites. Avoid sharing sensitive information online unnecessarily.


Now Try This

Explain two measures you can take to protect your e-reputation. (4 marks)

  1. Enable Privacy Settings on Social Media

    • Adjust privacy controls on platforms like Facebook or Instagram to limit who can view your posts or personal information. This reduces the risk of strangers accessing sensitive details.


  2. Think Before Posting

    • Avoid sharing content that could be misinterpreted or used to harm your reputation. Posts containing sensitive, controversial, or embarrassing material could damage personal or professional relationships.





 
 
 

Comments


bottom of page