5 - Understand ethical and operational issues and threats to computer systems Flashcards

1
Q

What is the term used when a worker passes on information concerning wrongdoing?

A

Whistleblowing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

If PC World were not to hire a new member of staff due to their gender or due to them having a learning difficulty, what would this be considered as?

A

Discrimination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the the name of a set of written rules which explains how people working in a particular profession should behave?

A

Code of practise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

If a business were to show an unreasonable like or dislike for a person based on personal opinions, what would this be considered as?

A

Bias

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

U.K law protect employees from organisations. What do they protect them from?

A

Unfair dismissal and not being promoted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What Act protects the employees safety?

A

Health and Safety Act 1974

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A business uses cloud computing to store data offsite in case of flooding or fires. This is known as what?

A

disaster planning and recovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A member of staff has been caught downloading films t work. What has he/she broken?

A

Acceptable Use Policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A member of staff from a bank has organised a secret gambling business. What has the member of staff broken?

A

Code of Conduct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is change management? And how can it support a business?

A

It is the approach to prepare and support individuals, teams, and organisations in making organisational change. This can support a business who is looking to restructure or when a business is looking to expand.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the term given of fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy entity?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the term used when a user gains unauthorised access to data in a system or computer?

A

Hacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the name of the term when malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions?

A

Viruses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the name given to a type of malware that is often disguised as legitimate software?

A

Trojan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is malware?

A

Software which is specifically designed to disrupt, damage a computer system. This can include computer viruses, worms, Trojan horses and spyware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the name given to the term where data can be taken by someone who is not the intended recipient?

A

Interception.

17
Q

How can interception of data be prevented?

A

Encrypting data

18
Q

What is meant by the term encryption?

A

The process of scrambling up messages/data so that it cannot be read by anyone other than the intended recipient.

19
Q

What is meant by the term decryption?

A

The process of unscrambling data/message back to its original state so it can be understood.

20
Q

Mr Eacott is discussing some personal data with Miss Read. What is the name of the term if a student is secretly or stealthily listening to the private conversation or communications of others without their consent?

A

Eavesdropping

21
Q

An organisation have been pretending to be customers banks and calling about their account have been using using psychological manipulation of people into performing actions or divulging confidential information. What is the name of this threat?

A

Social engineering

22
Q

Identify 5 different types of physical security methods

A

locks, biometrics, RFID, tokens, privacy screens, shredding.

23
Q

Identify 5 different types of digital security methods

A

anti-virus, firewalls, anti-spyware, username/passwords, permissions, encryption.

24
Q

Identify 3 different ways of safely disposing of data and computer equipment

A

Overwrite data, electromagnetic wipe, physical destruction