6.2 risks Flashcards

1
Q

25 a - Use the case study on PHIR in the 05838/05839/05840/05841/05842/05877 January 2024 Unit 2
Insert to answer this question.

PHIR send emails to customers when their packing boxes are
despatched in a container.

When the containers are transported to the leaving port, documents are
uploaded to a secure cloud location.

The security of the cloud location must be maintained.

Identify and describe two security risks to the secure cloud location.
6 marks

A

· Unauthorised / unintended access to data / hacking (1st) by someone who is not intended / authorised (1) resulting in data breach / leak /use
(1)

· Accidental loss of data (1st) files / documents are deleted (1) due to human error / equipment failure (1)

· Intentional destruction of data (1st) files / documents are deleted (1) by someone with an ulterior motive (1)

· Intentional tampering with data (1st) data can be changed (1) to meet the needs of / by an unauthorised person (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

16 a -

A crime prevention charity provides help and assistance to people who have been the victims of crime.

The charity also collects and collates crime statistics for publication on neighbourhood websites.

The statistics are stored securely but need to conform to the information security principle of
availability.

One information security risk to the stored data is intentional tampering with the data.

Identify and describe one other information security risk to the stored statistics.
3 marks

A

Unauthorised / unintended access to data / hacking (1st)
· Data is seen or used by those (1) who should not see / use it (1)

Accidental loss of data (1st)
The data is lost unintentionally (1) such as someone deleting the file containing the data / the file corrupting with no backup (1)

Intentional destruction of data (1st) · The data is destroyed by a deliberate act (1) usually as the result of a virus / hacking attack (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

13 - * Discuss how the principles of information security, including the risks and impacts, should be
considered by the response team when dealing with any SOS call.

10

A

Data integrity should be maintained to ensure the data / information is up-to-date, accurate, confidentially, complete and fit for purpose.

· The information should only be accessed by members of the response team who are dealing with the car. · Only authorised SOS response team members should deal with the call for help. · Data should always be available to and usable by the Response Team and the recovery & repair garage.

Risks:
· Unauthorised access to data including hacking.
· Accidental data loss.
· Intentional data destruction.
· Intentional tampering with the data.

Impacts:
· Loss of access to data meaning the response team cannot access the car records, so help cannot be given.
· Loss of information.
· Loss of reputation for the manufacturer / SOS team.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly