3. Stealing Data
Stealing Data is when a hacker manages to code themselves
into a websites server and access private information like
bank details and addresses. However, websites holding this
kind of information will usually Encrypt it, so that it is
inaccessible for hackers.
4. Malware
Malware is malicious software. It is software
that is created by an attacker and
transferred to your computer by a variety of
different ways, including a malicious email or
through downloaded software.
5. Direct Hackers
A hacker is somebody that finds and
creates loop holes in operating systems, to
then enter into them to edit certain items, or
delete parts of the operating system, or
even the whole thing.
6. Taking Over a Website
Taking over a website is when a hacker
accesses the site through loop holes, and
changes certain parts of the site. An
example of this would be if somebody had
changed Apple’s homepage to say ‘Android
Is Better’.
7. Spam
Spam is only received over emails. Spam is
unwanted emails, usually sent out in bulk to
a set mailing list, of which thousands of
other victims are added every day. The
content of the email will usually be offers
saying you have won something, or
questionnaires asking you to input personal
information.
8. Phishing
Phishing is when a person attempts, with
intent, to access personal data like
usernames, passwords and credit card
information.
9. Pharming
Pharming is when the attacker gets into a
websites servers and changes where a
user would end up if they entered the
normal URL for that website.
11. This Act was passed in 2000, to protect
online shoppers from fraud. The rules apply
when a company is selling a product or
service, without face to face contact. The
regulations of this act include Confirmation in
writing, a ‘cool off’ period, where the
customer can return items within 7 days
without penalty and protection from payment
card fraud.
Distance Selling Regulations
12. This act was passed in 1998, to control who can access certain data.
There are 8 principles with this act, all about how businesses must
control private information and data:
Processed fairly and lawfully
Obtained for specified and lawful purposes
Adequate, relevant and not excessive
Accurate and up to date
Not kept any longer than necessary
Processed in accordance with the individuals rights
Securely kept
Not transferred to any other country without adequate protection
The Data Protection Act