5 - Understand ethical and operational issues and threats to computer systems Flashcards
What is the term used when a worker passes on information concerning wrongdoing?
Whistleblowing
If PC World were not to hire a new member of staff due to their gender or due to them having a learning difficulty, what would this be considered as?
Discrimination
What is the the name of a set of written rules which explains how people working in a particular profession should behave?
Code of practise
If a business were to show an unreasonable like or dislike for a person based on personal opinions, what would this be considered as?
Bias
U.K law protect employees from organisations. What do they protect them from?
Unfair dismissal and not being promoted.
What Act protects the employees safety?
Health and Safety Act 1974
A business uses cloud computing to store data offsite in case of flooding or fires. This is known as what?
disaster planning and recovery
A member of staff has been caught downloading films t work. What has he/she broken?
Acceptable Use Policy
A member of staff from a bank has organised a secret gambling business. What has the member of staff broken?
Code of Conduct
What is change management? And how can it support a business?
It is the approach to prepare and support individuals, teams, and organisations in making organisational change. This can support a business who is looking to restructure or when a business is looking to expand.
What is the term given of fraudulent attempt to obtain sensitive information such as usernames, passwords and credit card details by disguising as a trustworthy entity?
Phishing
What is the term used when a user gains unauthorised access to data in a system or computer?
Hacking
What is the name of the term when malicious software program loaded onto a user’s computer without the user’s knowledge and performs malicious actions?
Viruses
What is the name given to a type of malware that is often disguised as legitimate software?
Trojan
What is malware?
Software which is specifically designed to disrupt, damage a computer system. This can include computer viruses, worms, Trojan horses and spyware.