ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them
• Security issues regarding data transfer
• Network communication
WWW.YAHMAD.CO.UK
, ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them
Security Issues
How can hackers effect your network and data?
Hackers
Introduce of viruses & spyware to the Network.
Viruses Threat to Data:
Spyware • Data could be deleted, edited, corrupted or be replicated.
\ • Data could be sold or passed on to other people.
Phishing Threat to Network:
Pharming • Network may have to be shut down to quarantine virus.
• This could stop production and cost an organisation a lot of
money.
Should the Advantages Disadvantages
internet be • To protect vulnerable users gaining • It would be extremely difficult and expensive
policed? access to undesirable websites. to police the internet.
• To prevent illegal material (software, • Infrastructure including staff and offices
videos) be openly posted and shared by would have to be required.
web users. • Would be difficult to enforce different rules in
• To bring to justice those users who different countries.
continually misuse the internet for their • Could go against freedom of speech.
personal gain.
WWW.YAHMAD.CO.UK
, ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them
In many countries, hacking of computer systems is an offence.
(a) Explain, using examples, the term hacking.
Exam Question
Hacking is the unauthorised access to computer systems with the intention of
causing harm. Hackers could edit, delete and steal data. Hackers could also
introduce viruses to a computer network to cause disruption. On the other hand
hackers could be employed to expose weaknesses of the system.
Describe the measures that should be taken to help protect data from being hacked.
The use of usernames and strong passwords to stop remote and local logins. Also
using different passwords for different accounts would reduce the chance of
hacking. Biometric systems could be used to ensure the official user is present.
WWW.YAHMAD.CO.UK
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them
• Security issues regarding data transfer
• Network communication
WWW.YAHMAD.CO.UK
, ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them
Security Issues
How can hackers effect your network and data?
Hackers
Introduce of viruses & spyware to the Network.
Viruses Threat to Data:
Spyware • Data could be deleted, edited, corrupted or be replicated.
\ • Data could be sold or passed on to other people.
Phishing Threat to Network:
Pharming • Network may have to be shut down to quarantine virus.
• This could stop production and cost an organisation a lot of
money.
Should the Advantages Disadvantages
internet be • To protect vulnerable users gaining • It would be extremely difficult and expensive
policed? access to undesirable websites. to police the internet.
• To prevent illegal material (software, • Infrastructure including staff and offices
videos) be openly posted and shared by would have to be required.
web users. • Would be difficult to enforce different rules in
• To bring to justice those users who different countries.
continually misuse the internet for their • Could go against freedom of speech.
personal gain.
WWW.YAHMAD.CO.UK
, ICT IGCSE Theory – Revision Presentation
4.2 Network Issues and Communication
Chapter 4: Networks and the effects of using them
In many countries, hacking of computer systems is an offence.
(a) Explain, using examples, the term hacking.
Exam Question
Hacking is the unauthorised access to computer systems with the intention of
causing harm. Hackers could edit, delete and steal data. Hackers could also
introduce viruses to a computer network to cause disruption. On the other hand
hackers could be employed to expose weaknesses of the system.
Describe the measures that should be taken to help protect data from being hacked.
The use of usernames and strong passwords to stop remote and local logins. Also
using different passwords for different accounts would reduce the chance of
hacking. Biometric systems could be used to ensure the official user is present.
WWW.YAHMAD.CO.UK