knowt logo

Computer Science : S5 : L6 : Solutions to Security Threats

—----------------------------------------------------------------------------------------------------------------------Section 5: The Internet and its Uses

Lesson 6 : Solutions to Security threats


URL Inspection - Spotting dodgy links in where once you have opened the link gives hackers access to your computer where they can steal data …


Automating Software Updates - Process where your software applies updates to the user’s computer with confirmation from the user. It ensures that a program is fit for service  and that users are satisfied with the software. It helps close off vulnerabilities that lets hackers in. They add new security features, making it harder for cyber attacks to hack into your devices. Software updates are there to improve older and less effective protocols to the newer. 


Authentication on Biometrics - Authentication using biometrics is when you use a part of your physical makeup to identify you and gain access to something of yours. An Example of this is using your fingerprint/face to unlock your phone.


Anti-malware  - is a type of software program created to protect information technology systems and individual computers from malicious software, or malware which prevents, detects and removes any malware.


Anti-virus - is a software design to detect and destroy computer viruses


Anti Spyware - Anti-spyware is a program design to prevent and detect unwanted spyware program installation and remove

Privacy Settings - Privacy settings are controls available on many websites and apps to limit who can access your profile and what information visitors can see. When online profiles are created, it's often assumed that they will be private by default.


Access Level - is when you can limit the amount of access a user has to a document or piece of data. This can determine if they can see it , comment on it , export it and edit it.

NS

Computer Science : S5 : L6 : Solutions to Security Threats

—----------------------------------------------------------------------------------------------------------------------Section 5: The Internet and its Uses

Lesson 6 : Solutions to Security threats


URL Inspection - Spotting dodgy links in where once you have opened the link gives hackers access to your computer where they can steal data …


Automating Software Updates - Process where your software applies updates to the user’s computer with confirmation from the user. It ensures that a program is fit for service  and that users are satisfied with the software. It helps close off vulnerabilities that lets hackers in. They add new security features, making it harder for cyber attacks to hack into your devices. Software updates are there to improve older and less effective protocols to the newer. 


Authentication on Biometrics - Authentication using biometrics is when you use a part of your physical makeup to identify you and gain access to something of yours. An Example of this is using your fingerprint/face to unlock your phone.


Anti-malware  - is a type of software program created to protect information technology systems and individual computers from malicious software, or malware which prevents, detects and removes any malware.


Anti-virus - is a software design to detect and destroy computer viruses


Anti Spyware - Anti-spyware is a program design to prevent and detect unwanted spyware program installation and remove

Privacy Settings - Privacy settings are controls available on many websites and apps to limit who can access your profile and what information visitors can see. When online profiles are created, it's often assumed that they will be private by default.


Access Level - is when you can limit the amount of access a user has to a document or piece of data. This can determine if they can see it , comment on it , export it and edit it.