Using anti-virus software
Using anti-spam software
Never using free email sites.
Using a firewall
By installing licensed software
By forwarding email attachments from an unknown source
By opening email attachments from an unknown source
By not downloading files from obscure websites.
Forward the email to others
Download it onto your system
Open it immediately
Delete the email
An email directing the recipient to enter personal details on a fake website
An email warning the recipient of a computer virus threat
An email advertyising a department store
An unwanted email that installs a virus on the recipeint's computer
Install windows software updates
Update the anti-virus software regularly
Restrict computer access to known persons
Install the latest versions of software
PC diadnostic software
Key management software
PC diagnostic software.
Key management software
Anti Malware software
A skilled programmer who writes computer games.
A skilled programmer who creates software and trains youngsters on how to write software.
A skilled programmer who uses authorised access to exploit information available on a computer.
A skilled programmer who secretly invades computers without authorisation.
Easy visibility to other users.
High resistance to application of updates.
Low resistance to potential hackers.
MS Word Options.
Commit it to memory
Keep a note of it in your wallet.
Tell your manager.
Use the name of your Cat.
It authenticates the user and gives access to all information.
It limits access to relevant levels of information.
It enables an accurate audit trail of transactions to be kept.
It gives the user anonymity.
To reduce the use of electricity.
To prevent data from getting corrupted.
To prevent unauthorised access to data
To cool off the hardware
Discussing confidential information over a telephone line.
Uploading confidential information to a shared web site.
Disclosing confidential information only to authorised systems or individuals
Posting confidential data on your company notice board
Theft of identity.
Loss of job.
It encrypts information being stored on a computer
It protects information from risk of unauthorised access.
It decrypts information being stored on a computer
It removes the need for a password.
No data security
. Access to all confidential information
They cannot be intercepted by unknown users.
They can be visible and accessible to other users.
They work over long distances.
They limit accessibility to other users.
In a compressed only format.
In an encrypted format.
In an unsigned email.
As quickly as possible.
. Long-range wireless protocol for exchanging data
Short-range wireless protocol for exchanging data
Long-range wired protocol for exchanging data
Short-range wired protocol for exchanging data
The IT Department.
The Company Director’s office.
The Purchasing Department
The Sales Department.
By reading the latest issue of the Financial Times
By speaking to the Finance Department.
By reading the policy in the organisation’s policy manual
By speaking to the Sales Department
The checks listed in the device manual
Interview the requesting person
The checks advised by a fellow worker
The checks listed in the organisation’s security policy
A technically well-informed team member
A senior member of the cleaning Department
The Systems Administrator
. The Maintenance Department
By letter to your manager
Using the telephone
Using the channel identified in the organisation’s security policy
By emailing the IT Manager.
The computer may crash
The selected files will be moved to the Recycle Bin
An important file may accidentally be deleted
A delete file confirmation window may appear
The operating system will automatically save all files and shutdown.
All open files will be recovered
All off-site backups will be lost.
Any files saved only on the hard disk of the computer may be lost.
To ensure that in the event of fire, flood or theft backup files are not destroyed
To make the files easily accessible to other locations of the organisation
To enable speedy recovery
To reduce the chance of data corruption due to a virus attack
Keep it in your pocket
Using misleading file names
Saving files in your Documents folder
Making multiple copies of the data.
A storage device, clearly labelled
A website offering a file sharing service
A shared area on a server
Leave it with a security guard
Leave it with your supervisor
. Close the lid
Use a security cable to secure it to the desk
Out of sight, on your person
Leave it on the bar
In your jacket pocket hanging over a chair
In your open bag on the floor
When the data stored on the storage device is encrypted
When the storage device is lost or stolen during transit
When the data files on the storage device are scanned for viruses.
When the storage device is accessed by a wireless device
By using a firewall
By using a device lock
By using anti virus software
By locking it in a drawer