5.3 Activity
5.3 Activity
Activity 5.3
1.A company has offices in four different countries. Communication and da sharing
between the offices is done via computers connecting over the in a Describe three data
security issues the company might encounter during
their day-to-day communications and data sharing.
1. Interception of Data
o Issue: Unauthorized interception during internet transmission.
o Threat: Potential financial loss, legal issues, and reputational damage.
o Mitigation: Encrypt data using SSL/TLS and utilize VPNs.
2. Malware Attacks
o Issue: Network infiltration via email or unsecured networks.
o Threat: Operational disruption, data corruption, and further attacks.
o Mitigation: Use antivirus software, perform network scans, and promote safe
internet use.
3. Insider Threats
o Issue: Security breaches from network-accessing employees.
o Threat: Data theft or manipulation with access rights.
o Mitigation: Implement least privilege access, monitor activities, and audit
security.
b For each issue described, explain why it could be a threat to the security
the company.
B. Three data security issues the company might encounter:
1. Unauthorized Access
2. Data Interception
3. Insider Threats
C.For each issue described, describe a way to mitigate the threat that has been posed.
2 Explain the following three terms:
Worm: A worm is a type of malicious software that can replicate itself and spread to other
computers or networks without any action from the user. It can cause harm by consuming
network bandwidth, slowing down systems, or even deleting files.
Ransomware: Ransomware is like a digital kidnapper. It sneaks into your computer, locks up
your files, and demands money for their release. It's important to stay safe by keeping your
devices protected and being cautious about suspicious links or downloads. Stay one step ahead of
those sneaky cybercriminals.
Trojan horse: A Trojan horse is like a sneaky trickster in the computer world. It pretends to be
harmless software, but it's actually carrying bad stuff. Once it gets inside your computer, it can
steal your info, get access to things it shouldn't, or cause other kinds of damage. So, always be
careful about what you download to keep your devices safe.
3 John works for a car company. He maintains the database that contains all th personal
data of the people working for the car company. John was born an 28th February 1990 and
has two pet cats called Felix and Max.
a John needs to use a password and a user name to log onto the database Why would the
following passwords not be a very good choice:
ī 280290: 280290," is not recommended because it's John's birthdate, which is personal
information that could be easily guessed
FiLix1234: it includes a mix of uppercase, lowercase, and numbers.So, it is a better option still if
does include the name of his pet so it might be possible to guess the password.
John04:John is included in it so it can be guessed
b Describe how John could improve his passwords and also how he should maintain his
passwords to maximise database security.
Ans:To maintain his passwords, John can use a password manager app to securely store and
generate unique passwords for each account. This way, he doesn't have to remember them all. It's
also a good idea for John to regularly update his passwords and enable two-factor authentication
for an extra layer of security.
< When John enters a password on his computer he is presented with the following
question on his screen:
Would you like to save the password on this device?
Why is it important that John always says No to this question?
Ans: It's important for John to always say no to saving passwords on his device because if
someone gains access to his computer or device, they could easily log into the database and
access sensitive personal data. To improve his passwords, John can use a combination of
uppercase and lowercase letters, numbers, and special characters.