answersLogoWhite

0


Want this question answered?

Be notified when an answer is posted

Add your answer:

Earn +20 pts
Q: What are the causes of unauthorised use without damage to data?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

How does a USB lock actually work?

A USB lock works by physically blocking USB ports from unauthorised access, thus preventing unauthorised data transfer, which reduces the risk of data leakage, data theft and computer viruses.


Is responsible for protecting the data against unauthorised access?

security management


What are the causes of data protection act?

The Data Protection Act was introduced with the increasing practice of storing peoples personal information on computer databases. It was set up to protect the privacy of the individual against unauthorised access to their personal details.


Three things that a surgery could do to make sure the data was kept safe from unauthorised people?

1. Use encryption of the data so that if an unauthorised person gets hold of it, it is more difficcult for them to understand 2. Make sure the computers which hold the data are physically secure e.g. in a locked romm when no one is using them 3. Put passwords on the computers to avoid unathorised access or 3. Do not make the data available on a network where an unauthorised person may have access


What is the process of modifying data thet doesnt allow unauthorised users from reading it?

It's called encryption.


List 5 risks to a user computer data?

1. List 5 risks to user's computer data


Explain why firewalls are valuable tools for denying access to unauthorised persons on your computer?

because they can stop hackers from taking or viewing your data


Why does your psp say file is corrupted when you try and play umdumper from phonicuk.com?

The data is either corrupt, or you're trying to run unauthorised code.


What does it mean when a customer's credit card information is encrypted?

It means the information is encoded somehow, so if someone unauthorised were to see the data, they wouldn't be able to understand it. Only the authorised systems can decode that data.


Can you unplug a usb connection without damage?

In 99.999% percent of cases, yes, you can. Some people have experienced data loss by taking a USB out without stopping it, but this is very rare.


How do hackers and crackers differ?

Hackers gain unauthorised access to electronic information systems and may view data, but will not tamper with it. Crackers on the other hand, break into systems with the intention or stealing or damaging the data in some way.


What is Data misuse and unauthorised transfer or copying?

data miss use is the term which is defined as "the data belongs to certain 3rd party is shared to all others with out their permission" or It is also said as we takes away the confidential data from the others without their permission. example:1.the project codes of a company are shared to others so that the certain company codes are known others and they can miss use them. 2. by the process of hacking one can retrieve the confidential details of a company