5 - Understand ethical and operational issues and threats to computer systems Flashcards
What is the term used when a worker passes on information concerning wrongdoing?
Whistleblowing
If PC World were not to hire a new member of staff due to their gender or due to them having a learning difficulty, what would this be considered as?
Discrimination
What is the the name of a set of written rules which explains how people working in a particular profession should behave?
Code of practise
If a business were to show an unreasonable like or dislike for a person based on personal opinions, what would this be considered as?
Bias
U.K law protect employees from organisations. What do they protect them from?
Unfair dismissal and not being promoted.
What Act protects the employees safety?
Health and Safety Act 1974
A business uses cloud computing to store data offsite in case of flooding or fires. This is known as what?
disaster planning and recovery
A member of staff has been caught downloading films t work. What has he/she broken?
Acceptable Use Policy
A member of staff from a bank has organised a secret gambling business. What has the member of staff broken?
Code of Conduct
What is change management? And how can it support a business?
It is the approach to prepare and support individuals, teams, and organisations in making organisational change. This can support a business who is looking to restructure or when a business is looking to expand.
What is the term given of fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy entity?
Phishing
What is the term used when a user gains unauthorised access to data in a system or computer?
Hacking
What is the name of the term when malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions?
Viruses
What is the name given to a type of malware that is often disguised as legitimate software?
Trojan
What is malware?
Software which is specifically designed to disrupt, damage a computer system. This can include computer viruses, worms, Trojan horses and spyware.
What is the name given to the term where data can be taken by someone who is not the intended recipient?
Interception.
How can interception of data be prevented?
Encrypting data
What is meant by the term encryption?
The process of scrambling up messages/data so that it cannot be read by anyone other than the intended recipient.
What is meant by the term decryption?
The process of unscrambling data/message back to its original state so it can be understood.
Mr Eacott is discussing some personal data with Miss Read. What is the name of the term if a student is secretly or stealthily listening to the private conversation or communications of others without their consent?
Eavesdropping
An organisation have been pretending to be customers banks and calling about their account have been using using psychological manipulation of people into performing actions or divulging confidential information. What is the name of this threat?
Social engineering
Identify 5 different types of physical security methods
locks, biometrics, RFID, tokens, privacy screens, shredding.
Identify 5 different types of digital security methods
anti-virus, firewalls, anti-spyware, username/passwords, permissions, encryption.
Identify 3 different ways of safely disposing of data and computer equipment
Overwrite data, electromagnetic wipe, physical destruction