5 eSecurity (3)

Resources | Revision Questions | Information Technology IT

Login to see all questions

Click on a question to view the answer

1.

Describe a range of malware prevention strategies that can be implemented on a personal computer. Your answer should include details of how each strategy works and its potential limitations.

2.

Question 3: Create a table outlining the key features of Trojan horses, worms, spyware, and ransomware. Your table should include columns for 'Malware Type', 'Propagation Method', 'Primary Objective', and 'Typical Impact'.

3.

Question 1: Explain the key concepts of personal data security and confidentiality. In your answer, discuss the potential consequences of a breach of personal data and outline three measures an organisation can implement to mitigate these risks.