Table of contents:


3.1 - Potential risks to data and personal information when information is transmitted and stored digitally

There are several risks to data and information, each detailed below:

If a user who is not allowed access to a network access it, it’s known as unauthorized access.

Cybercriminals can gain unauthorized access either by trying to guess logins, or by using computers/AI that guess approximately 1000 logins per second.

Users may try to gain unauthorized access to use devices as botnets.

<aside> ✨

Botnets - devices used to spread malware (malicious software)

</aside>

<aside> ✨

Malicious software – Software that is created with the intention to do harm.

</aside>

The botnets are installed by criminals looking for the weakest, most vulnerable devices within the network. As soon as they are infected, they infect the rest of the network.

Unauthorized access occurs when a user gains entry to a network without permission. Cybercriminals can achieve this by guessing login credentials or using sophisticated tools that attempt thousands of logins per second.

One goal of unauthorized access is to use compromised devices as botnets—networks of infected devices used to spread malware (malicious software).

<aside> ✨

Malware is software created with the explicit intention to cause harm.

</aside>

Criminals target the weakest, most vulnerable devices within a network to install botnets. Once infected, these devices quickly spread malware throughout the entire network.


Another risk to data and information could be deliberate damage by malware.