BTEC IT – Unit 1 - Revision Guide - TEST 7 Questions with complete solution latest
BTEC IT – Unit 1 - Revision Guide - TEST 7 Questions with complete solution latestTotal Marks Achieved: 1. List the four main threats to data, Information, and systems. (4) Mark achieved:4 Accidental damage Hackers Phishing Malware 2. Describe what malware is. (1) Mark achieved:1 Malware is a software intended to provide dangers to IT systems 3. List and explain two impacts of treats on individuals. (4) Mark achieved:4 Bank fraud – hacker accessing bank details in order to withdraw can and make purchases which is illegal Identity Fraud – stealing personal information from individuals like bank accounts, emails 4. List and explain two impacts of treats on organisations. (4) Mark achieved:4 Loss of reputation – if a business has a loss of reputation customers will become less eager in purchasing form the business which will mean customers will go to other business that provide the same service intended Loss of income – business having a decrease of finance which was intentionally caused by hackers will have a struggle in carrying out their standard functions 5. Henley Investments is a finance company that provides investment advice and financial portfolio management services. Given the sensitive nature of the financial information that the firm manages using IT systems, it is concerned about threats to its systems. Analyse the impact that threats to data security might have on Henley investments. (6) Mark achieved:5 An impact that threats to data security might have on Henley investments is loss of reputations because if Henley investments has a loss of reputations customers and company investors will become less eager in purchasing from the company which will mean customers and other potential investors will go to other company that provide the same service and products intended. Another impact that threats to data security might have on Henley investments is loss of income as Henley’s investments will have a decrease of finance which was intentionally caused by hackers through IT systems virus such as Malware’s. Thus will provide a struggle in carrying out their standard functions using an IT systems as they will be cautious of threats. 6. List the six main techniques for prote
Written for
- Institution
- BTEC IT – Unit 1 - Reviion Guie - TST 7
- Module
- BTEC IT – Unit 1 - Reviion Guie - TST 7
Document information
- Uploaded on
- March 6, 2024
- Number of pages
- 3
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
btec it unit 1 revision guide test 7
-
btec it unit 1 revision guide test 7 questio
-
total marks achieved 1 list the four main threat