There are many dangers that can arise from the use of computers to manage files of personal data such as:-
software failure, e.g. virus damage. This may have been caused by Cyber Attacks e.g. Worms, Spyware, Trojans
Malicious damage e.g. Hacking, White Collar Crime
Other potential threats to computer systems include
fire, flood, lightning, terrorist attacks etc.
hardware failure, e.g. power supply unit failing
accidental damage
Computer systems are vulnerable to cyberattacks.
• Worms are self-replicating programs that identify vulnerabilities in operating systems
• They can enable remote control of the infected computer and can lead to data loss. They do not require a vector.
Installed by opening attachments or downloading infected software.
Spyware can be used to collect stored data (without the user’s knowledge).
A Trojan is a program that appears to perform / disguises itself as a useful function that enables data to be stolen / damaged.
Virus
Virus is a computer program or software that connect itself to another software or computer program to harm computer system. When the computer program runs attached with virus it perform some action such as deleting a file from the computer system. Virus can’t be controlled by remote.
Worm
Worms is also a computer program like virus but it does not modify the program. It replicate itself more and more to cause slow down the computer system. Worms can be controlled by remote.
Trojan Horse
Trojan Horse does not replicate itself like virus and worms. It is a hidden piece of code which steal the important information of user. For example, Trojan horse software observe the e-mail ID and password while entering in web browser for logging.
Many organisations carry out disaster planning for their computer systems. Disaster planning is important as many organisations could not survive if the system failed and data was lost. All computers are liable to fail, you cannot always avoid fires, floods, terrorist attacks etc. It is vitally important that organisations recover quickly after a disaster.
Elements of Disaster Planning
There are a number of tasks that should be followed to allow an organisation to recover quickly following a disaster including:-
Backups should be made and files should be archived off site
There should be an alternative system and a back up power supply
Staff need to be trained for this situation to be able to recover successfully and there should be clear instructions for staff to follow.
NOTE: For further details on BACK UP PROCEDURES please click here.
Before the disaster
Risk analysis, preventative measures and staff training
Ensure that when a disaster happens, loss of data is minimised and the company has ensured that the data can be recovered.
During the disaster:
Staff response – implement contingency plans
Prevents further damage to the data and begins immediate recovery of data
After the disaster:
Recovery measures, purchasing replacement hardware, re-installing software, restoring data from backups
Restores normal running and recovers all data.