Protects data against loss/corruption and allows it to be recovered.
Ensuring data is protected against unauthorised access.
Ensuring the accuracy, completeness, and consistency of data during and after processing.
Malicious software that replicates itself and can damage, delete, or corrupt data.
Malicious software that secretly records user activity and sends data to third parties.
Illegal/unauthorised access used to delete, damage, or collect data.
Phishing involves tricking users into disclosing private information, while pharming redirects users to fake websites.
Steps to prevent malware from infecting your computer.
A firewall checks incoming and outgoing traffic against criteria set by the user.
Enhances security by requiring multiple forms of verification.
Protects the computer by scanning for and removing malicious software.