Using anti-virus software
Using anti-spam software
Never using free email sites.
Using a firewall
By installing licensed software
By forwarding email attachments from an unknown source
By opening email attachments from an unknown source
By not downloading files from obscure websites.
Forward the email to others
Download it onto your system
Open it immediately
Delete the email
An email directing the recipient to enter personal details on a fake website
An email warning the recipient of a computer virus threat
An email advertyising a department store
An unwanted email that installs a virus on the recipeint's computer
Install windows software updates
Update the anti-virus software regularly
Restrict computer access to known persons
Install the latest versions of software
PC diadnostic software
Key management software
PC diagnostic software.
Key management software
Anti Malware software
A skilled programmer who writes computer games.
A skilled programmer who creates software and trains youngsters on how to write software.
A skilled programmer who uses authorised access to exploit information available on a computer.
A skilled programmer who secretly invades computers without authorisation.
Easy visibility to other users.
High resistance to application of updates.
Low resistance to potential hackers.
MS Word Options.
Commit it to memory
Keep a note of it in your wallet.
Tell your manager.
Use the name of your Cat.
It authenticates the user and gives access to all information.
It limits access to relevant levels of information.
It enables an accurate audit trail of transactions to be kept.
It gives the user anonymity.
To reduce the use of electricity.
To prevent data from getting corrupted.
To prevent unauthorised access to data
To cool off the hardware
Discussing confidential information over a telephone line.
Uploading confidential information to a shared web site.
Disclosing confidential information only to authorised systems or individuals
Posting confidential data on your company notice board
Theft of identity.
Loss of job.
It encrypts information being stored on a computer
It protects information from risk of unauthorised access.
It decrypts information being stored on a computer
It removes the need for a password.
No data security
. Access to all confidential information
They cannot be intercepted by unknown users.
They can be visible and accessible to other users.
They work over long distances.
They limit accessibility to other users.
In a compressed only format.
In an encrypted format.
In an unsigned email.
As quickly as possible.
. Long-range wireless protocol for exchanging data
Short-range wireless protocol for exchanging data
Long-range wired protocol for exchanging data
Short-range wired protocol for exchanging data
The IT Department.
The Company Director’s office.
The Purchasing Department
The Sales Department.
By reading the latest issue of the Financial Times
By speaking to the Finance Department.
By reading the policy in the organisation’s policy manual
By speaking to the Sales Department
The checks listed in the device manual
Interview the requesting person
The checks advised by a fellow worker
The checks listed in the organisation’s security policy