Threats to system performance, information security and user safety
A virus will be a major threat to all three categories. A virus, granting an unauthorised user with all the tools necessary to control your PC, would dramatically corrupt system performance because of the external control and malicious programming stunting and throttling other programs in order to allow the necessary websites and executables to run for the hacker's benefit. Information would be compromised as they could access passwords, sensitive documents, and pretty much anything on your hard drive without a solid passcode.
The mere fact that so much personal data is compromised would be the main reason for user safety to be under threat also. The virus can reveal your home address, bank details, and even medical information if there are any emails or documents outlining as such.
Another major threat to those categories would be an overzealous anti-virus software program. While it would keep the user safe from dangerous websites, its metrics for deciding which sites are potentially dangerous may be too aggressive. This would mean legitimate programs and websites may be blocked, and the performance may suffer if the program perceives too many standard applications to be a threat; eating up RAM and slowing down the PC dramatically.
The natural human response would be to uninstall the program entirely, which then leads to an information security and user safety threat because there is no anti virus software protecting the user from online threats. If unlucky enough to catch a virus or cyber attack, then all three categories are threatened in the manner aforementioned.
And lastly, a very current, modern compromise within our user safety, overdependency on cloud services. While cloud services do not necessary affect system performance, they can affect information security for the sole reason that documents are no longer just stored on a PC or mobile hard drive - they are on a cloud server that can be accessed from anywhere, on any computer, and all a user needs is one password.
The ease-of-use and somewhat anonamous nature of cloud services mean that individuals often don't take the same level of caution with Google Drive or OneDrive, and without two-factor authentication selected under settings, it can be accessed via just a single password.
This would then present the unauthorised user with access to every file that has ever been uploaded to the cloud, which depending on the size of the cloud storage, could stretch back years.Combatting these threats
- Be careful which sites you browse online. While Anti-Virus software is effective, the easiest way to avoid a virus is common sense and caution whilst using the internet. For large companies, check the URL doesn't include a rogue punctuation mark; a common way to trick users into entering a questionable site. Does the site and site description sound legitimate? Is there any doubt that the link above may be malicious? You can always run the URL through a URL checker and it can scan for recent activity, suspicious or no, and generally give you a clearer idea on its authenticity. But this should only be used as a guide. Use instinct and intuition to stay safe online and dramatically reduce your chances of receiving a virus.
- Choosing Anti-virus software wisely. An overzealous program will likely lead you to uninstalling it shortly after purchase, which leaves you at square one with a PC that is much more compromised to cyber threats. An effective, subtle version that doesn't consume RAM or block genuine programs will be the best solution and it is always recommended you thoroughly research the program you intend on buying before proceeding.
- Be vigilant over what is stored on your cloud. Any sensitive documents that are uploaded can be encrypted on the cloud via a virtual 'vault' with a hefty passkey, but for maximum security, remove it from the cloud entirely and keep it encrypted on the PC hard drive. In addition, be careful about where you access your cloud and always make sure to log out of it. For example, if accessing the cloud in an Internet Café or even an old workplace, always make sure to sign out before leaving as the PC will remember your details otherwise and leave your Cloud wide open for the next user without any decrypting necessary.
Laws and guidelines for businesses
- ASA (Advertising Standards Agency) and Advertising laws: To summarise, businesses have a duty to be honest within their advertising via either print or digital, and they must hold evidence that they can prove their claims to be true. This is a bigger issue in some industries more than others, and many exaggerated claims go unpunished or proven via technicality (e.g a phone manufacturer claiming 13 hour battery life, but doesn't describe how the test is conducted wouldn't violate these advertising standards because the mobile would last that long with incredibly light use and cellular data turned off; even though real world battery life is nowhere near the claim).
The ASA pursue violations via complaints, which are then inquired and run past the advertiser and industry experts to determine the validity of the complaint. Then the authority is escalated and brought to an Independent Reviewer, who can then confirm the exaggeration or violation; followed by the appropriate punishment. The punishment is usually a fine or bad publicity via publication of the Advertising Standard violation.
2. GDPR: The duty to properly store, share and handle personal data. This also means deleting the data on request, sharing data on request, and deleting the personal data when not required by the company holding it (e.g past employers, deleted online accounts). For the internet, this would apply most directly to e-commerce, which requires the company to process banking details on a regular basis. These details must be stored safety and securely, and removed when no longer needed.
Proof of saving bookmarks as a HTML (Question C5)