6.2 - Risks

6.2 - Risks

Assessment

Flashcard

Information Technology (IT)

11th Grade

Hard

Created by

TRC STUDENT

FREE Resource

Student preview

quiz-placeholder

13 questions

Show all answers

1.

FLASHCARD QUESTION

Front

What is unauthorised access to data?

Back

Unauthorised access to data occurs when individuals without proper authorization view data. This can happen due to espionage or poor information management.

2.

FLASHCARD QUESTION

Front

What is espionage in the context of data security?

Back

Espionage is the act of collecting data to use against an organization, such as a competitor acquiring information about a rival's product before its public launch.

3.

FLASHCARD QUESTION

Front

How can poor information management lead to unauthorised data access?

Back

If data is insecurely stored or too many people have access to sensitive information, it increases the likelihood of unauthorized access.

4.

FLASHCARD QUESTION

Front

What are the consequences of unauthorised data access?

Back

Competitors may benefit, and it breaches the Data Protection Act (2018) if personal data is accessed.

5.

FLASHCARD QUESTION

Front

What is accidental data loss?

Back

Accidental data loss refers to information being irretrievably lost, such as through equipment failure or human error.

6.

FLASHCARD QUESTION

Front

What are some causes of accidental data loss?

Back

Causes include equipment failure, technical errors, and human error, such as accidentally deleting files.

7.

FLASHCARD QUESTION

Front

What are the effects of accidental data loss?

Back

It can delay processes like analysis and trend recognition, and breaches the Data Protection Act (2018) if personal data is lost.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?