| Threat | Description | Preventive Measure |
|---|---|---|
| Phishing | Fake emails or messages that appear to be from a trusted source, asking for personal data. | Check sender address, hover over links, never give passwords via email. |
| Pharming | Redirecting users from a legitimate website to a fraudulent one. | Use up‑to‑date browsers, verify URL, enable DNS security extensions. |
| Smishing | SMS‑based phishing – text messages requesting personal details. | Do not click links or reply to unknown numbers; verify with the organisation directly. |
| Vishing | Voice‑call phishing – callers pretend to be from a bank or school. | Never give personal data over the phone unless you initiated the call and verified the number. |
| Malware / Viruses | Software that damages or steals data. | Install anti‑virus, keep software updated, avoid downloading from unknown sources. |
| Ransomware | Malware that encrypts files and demands payment. | Regular backups, do not open suspicious attachments, use reputable security suites. |
| Card‑fraud | Unauthorised use of payment‑card details. | Never store full card numbers in plain text; use secure payment gateways. |
| Shoulder surfing | Observing someone’s screen or keyboard to capture passwords. | Shield the screen, use privacy screens, log off when stepping away. |
| Hacking (unauthorised access) | Exploiting vulnerabilities to gain illegal access to systems. | Strong passwords, firewalls, regular patching, intrusion‑detection systems. |
Linking safeguards to the seven principles:
| Principle | Explanation |
|---|---|
| Lawful, Fair and Transparent Processing | Data must be processed legally, respect individuals’ rights and be clear about how it is used. |
| Purpose Limitation | Collect data only for specified, explicit and legitimate purposes; do not reuse incompatibly. |
| Data Minimisation | Gather only the data necessary for the intended purpose. |
| Accuracy | Keep data accurate and up‑to‑date; correct or delete errors promptly. |
| Storage Limitation | Retain data no longer than needed for its original purpose. |
| Integrity and Confidentiality (Security) | Protect data with appropriate technical and organisational measures against unauthorised access, loss or damage. |
| Accountability | The data controller must demonstrate compliance with all other principles. |
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources, past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.