5.3 I can describe the threats to information security when working online.
1. Why would a failed hard drive be a risk to your information?
A failed hard drive would be risk to your information because all your information will get corrupted and it will result you losing all of your files.
2. What is the best way to make sure your information is okay even if hardware fails?
The best way to ensure that your information is safe when the hardware fails is to back up your information/files either on G-Drive or Cloud.
3. What is a cracker?
A cracker is someone that breaks into others' computing facilities for their own personal gain - be it financial, revenge, or amusement. (Definition of cracker taken from http://www.wilsonmar.com/1secvul.htm)
4. What is a script kiddie?
It is a derogatory term for a wannabe cracker who lacks programming skills and thus relies on prewritten scripts and toolkits for their exploits. (Definition script kiddie taken from http://www.wilsonmar.com/1secvul.htm)
5. What is a hacktivist?
A hacktivist is a cracker who gains unauthorized access to computer files or networks to steal the information.
A failed hard drive would be risk to your information because all your information will get corrupted and it will result you losing all of your files.
2. What is the best way to make sure your information is okay even if hardware fails?
The best way to ensure that your information is safe when the hardware fails is to back up your information/files either on G-Drive or Cloud.
3. What is a cracker?
A cracker is someone that breaks into others' computing facilities for their own personal gain - be it financial, revenge, or amusement. (Definition of cracker taken from http://www.wilsonmar.com/1secvul.htm)
4. What is a script kiddie?
It is a derogatory term for a wannabe cracker who lacks programming skills and thus relies on prewritten scripts and toolkits for their exploits. (Definition script kiddie taken from http://www.wilsonmar.com/1secvul.htm)
5. What is a hacktivist?
A hacktivist is a cracker who gains unauthorized access to computer files or networks to steal the information.