5 Questions
What type of prevention strategy is the local hospital using by employing an ethical hacker?
Penetration testing
What are three errors that the hospital's staff could make that may endanger the security of the network?
Using weak passwords, clicking on suspicious links, and leaving devices unlocked
What is the purpose of identifying and/or preventing a denial of service attack?
To overload a network and make it unavailable to users
What is the difference between an active and passive digital footprint?
Active footprints are intentionally created by users, while passive footprints are created without the user's knowledge
What is the purpose of monitoring digital footprints in the context of businesses?
To identify potential security threats
Study Notes
Prevention Strategy
- The local hospital is employing an ethical hacker as a prevention strategy to identify and mitigate potential security risks and vulnerabilities in their network.
Common Errors
- Hospital staff may make the following errors that can endanger the security of the network:
- Using weak passwords or sharing them with others
- Clicking on suspicious links or opening unverified emails
- Not keeping software and systems up to date with the latest security patches
Denial of Service Attack
- The purpose of identifying and/or preventing a denial of service (DoS) attack is to ensure that the network remains accessible and functional, preventing attackers from overwhelming the system with traffic in order to make it unavailable to users.
Digital Footprints
- An active digital footprint refers to the intentional online presence and data that an individual or organization creates, such as social media profiles or websites.
- A passive digital footprint refers to the unintentional online presence and data that an individual or organization creates, such as search history or browser cookies.
Monitoring Digital Footprints
- The purpose of monitoring digital footprints in the context of businesses is to identify and manage online risks, maintain a positive reputation, and protect against cyber threats and data breaches.
Test your knowledge on identifying phishing emails with this WJEC GCSE Digital Technology quiz. Using an email example, you'll need to identify the six indicators that suggest it could be a phishing email. This quiz is perfect for those studying digital technology and cybersecurity and will help you develop your skills in identifying threats to data.
Make Your Own Quizzes and Flashcards
Convert your notes into interactive study material.
Get started for free