CA4 Flashcards
CA4
State:
Purpose of Health and Safety at Work Act
Provide guidance to employers and employees when working with computer systems and define actions employers should take to protect employees
Fill The Blank:
Almost everyone has a …………. under the Health and Safety Act at Work to work and act safely
Duty
Fill The Blank:
Employees must take reasonable ……….. of their own and ……….. safety under the Health and Safety at Work Act.
Care, Others
State:
What the Health and Safety at Work act makes illegal
Act recklessly or intentionally act in such a way to endanger yourself or others
State:
What the DSE regulations requires business/schools/colleges to do (four things)
Display Screen Regulations
- Analyse Workstations and assess and reduce risks
- Plan work so that there are breaks or changes of activity
- Arrange and pay for eye tests and glasses (if needed)
- Provide health and safety information and training
Fill The Blank:
Employers need to check that the computer equipment and ………. is ……… and any risks that are found have actions taken to fix them.
DSE - Analyse workstations and assess and reduce risks
Area, Safe
State:
What do employers and employees working from home have to complete
DSE - Analyse workstations and assess and reduce risks
DSE workstation assessment
State:
3 examples of correct and safe arrangment of a workstation (related to posture/equipment positioning etc.)
DSE - Analyse workstations and assess and reduce risks
3 of:
* Forearms are close to horizontal and hands in a straight line
* Space in front of keyboard, keyboard titlts, mouse in suitable position
* Chair is adjustable inlcuding the height and backrest
* Thighs are horizontal
* Five point chair base for stability
* Screen can be moved into position, at or slightly below eye level
* Screen is placed where there is no glare or reflection
* Clearance under the desk for legs to not touch desk
* Space under desk
* Feet flat on the floor, or on footrest
State:
3 minimum requirements for employers to ensure workstations comply to
DSE - Analyse workstations and assess and reduce risks
- Adjustable chairs and suitable lighting
- Tilt and swivel monitors
- Ensuring that the workstation has sufficient space for keyboard, monitor and any paperwork
Fill The Blank:
Employees should not be expected to work at a DSE ….. …….. and regular ……………. or change in activity should be provided by an employer
DSE - Analyse workstations and assess and reduce risks
All day, Breaks
State:
3 examples of what staring at working with DSE (Dispaly Screen Equipment) can lead to over a long period of time
DSE - Arrange and pay for eye tests and glasses (if special ones are nee
3 of:
* Tired eyes
* Discomfort
* Temporary short-sightedness
* Headaches
State:
2 examples of responsibilities that lie with an employee
DSE
2 of:
* Check screen is well positioned and properly adjusted
* Make sure lighting conditions are suitable
* Take regular breaks from screen work
Fill The Blank:
Employees of a business who work with DSE can ask for an employer to pay for …… appointments and to ……………. them
DSE
Eye, Arrange
Fill The Blank
Employers must provide …………. to make sure that employees know how to use ………………… correctly
DSE - Provide Health and Safety Training Information
Training, Equipment
State:
3 things that every general working environment should have/be
General Working Environment
- Have appropriate facilities (toilets, washbasins, drinking water, place to rest/eat)
- Healthy working environment
- Be a safe workplace
State:
3 examples of making a healthy working environment from HSE
General Working Environment
3 of:
* Good ventilation
* Reasonable working temperature
* Lighting suitable for the work being carried out
* Enough room space, suitable for the work being carried out
* Enough room space for suitable workspaces and seating
* Appropriate waste containers
State:
2 examples of making a safe workplace from HSE
General Working Environment
2 of:
* Maintained buildings and work equipment
* Floors and traffic routes kept free of obstructions
* Windows that can be opened and cleaned safely
* Any glass or transparent doors or walls protected or made of safety material
Define:
HSE
General Working Environment
Health and Safety Executive
State:
2 examples of areas a health and safety policy must cover
General Working Environment
2 of:
* Statement of intent
* Responsibilities for health and safety
* Arrangements for health and safety
Fill The Blank:
Any employee is responsible for reporting ……………….. as soon as possible to rectify the issue. If an issue is identified an employer may use a ……………. ……….. to tell other employees of the issue
Possible risks and prevention
Accidents, Warning sign
State:
What DPA and GDPR aim to do
Control how personal data and information is used by organisations, businesses and the UK Government as well as empower individuals to take control over their personal data
Explain:
What DPA means in comparison to GDPR
DPA is the UK’s implementation of the EU’s General Data Protection Regulation after the UK left the EU
State:
4 purposes of the DPA 2018
The principles of the act
4 of:
* Used fairly, lawfully and transparently
* Used for specified, explicit purposes
* Used in a way that is adequate, relevant and limited to only what is necessary
* Accurate and, where necessary, kept up to date
* Kept for no longer than necessary
* Kept appropriately secure
State:
4 purposes of the GDPR
The principles of the act
4 of:
* Lawfullness, fairness, trainsparency
* Purpose limitation
* Data minimisation
* Accuracy
* Storage limitation
* Integrity and confidentiality
State:
3 examples of characteristics DPA provides legal protection of
The principles of the act
3 of:
* Race
* Ethnic background
* Political opinions
* Religious beliefs
* Trade union membership
* Genetics
* Biometrics
* Health
* Sex life or orientation
Fill The Blank:
Under DPA a data subject (User) has ……… such as beign able to find out what ……….. is being held about them
Data subject rights
Rights, Data
State:
4 rights a data subject (user) has under DPA
3 of:
* Be informed about how the data is being used
* Access personal data
* Have incorrect data updated
* Have data erased
* Stop or restrict the processing of the data
* Data portability
* Object to how the data is processed in certain circumstances
* Automated decision making processes
* Profiling
Fill The Blank:
DPA and GDPR both require …………… for a marketing ……………… to be sent
Marketing Consent
Consent, Message
Fill The Blank:
Consent must be ………… and …………. given, clear and specific.
Marketing Consent
Knowingly, Freely
Fill The Blank:
Giving consent for marketing material must be …………. and therefore must be an …….-…. method and not in ……… and ………………. because these are hard to understand and rarely read
Marketing Consent
Clear, Opt-in, Terms and Conditions
Fill The Blank:
It must be made easy to opt-out of marketing material such as ‘……………’ at the bottom of an email because consent can be ……………. at any time
Marketing Consent
Unsubscribe, Withdrawn
Fill The Blank:
GDPR makes it clear that pre-………….. boxes are not valid ……………
Marketing Consent
Ticked, Consent
Explain:
Higher Maximum penalty that can be issued by ICO
Enforcement
Failure to comply with core data protection principles or individuals rights as in DPA
£17.5m or 4% of total annual worldwide turnover in preceding financial year (whichever is higher)
Explain:
Standard penalty that can be issued by ICO
Enforcement
All other infringements other than what is covered in Higher max. penalty (breaching core data protection principles)
£8.7m or 2% of totalannual worldwide turnover in preceding financial year (whichever is higher)
Fill The Blank:
The original focus of the CMA was to …………………. the act of accessing or ……………….. data stored on a computer system without appropriate consent or ……………….
Criminalise, Modifying, Permission
FIll The Blank:
Over time where the use of computers and ways to access ……../systems has increased there has been many ………………… to the CMA
Data, Amendments
State:
Why it is good that the CMA does not provide a definition of ‘computers’
Because a definition could quickly become outdated because of constant evolution
State:
3 original sections of the CMA
- Unauthorised access to computer material
- Unaurhtorised access to computer materials with intent to commit a further crime
- Unauthorised modification of data
State:
What 2 sections were added to the CMA later in 2006 and 2015
- Making supplying and obtaining any articles for use in a malicious act using a computer
- Unauthorised acts causing or creating risk of serious damage
Define:
Hacking
Examples of Offences
Finding weaknesses in an established system and exploiting them - a computer hacker finds weaknesses in a computer system
State:
3 examples of motivation for hackers
Examples of Offences
- Profit
- Protest
- Challenge
Define:
White hat hackers
Examples of Offences
Where hacker is given permission to hack into systems to identify any loopholes or vulnerabilities and tell the system owner. Because this is done with permission, it is legal.
Define:
Grey hat hackers
Examples of Offences
Where the hacker hacks into computer systems for fun or to troll but does not have malicious intent towards the computer systems - if they find a weakness, they may offer to fix the vulnerability for a fee
Define:
Black hat hackers
Examples of Offences
Where the hacker hacks into a computer system with malicious intent - stealing, exploiting stolen or seen data or selling the data
Fill The Blank:
British …………… suffered a hacking attack between ………………… and ……………………. in 20…. which led to a data breach with …… million customers affected - limited to the people who booked flights between these dates. This worked by redirected users to a ……….. site to enter the card details which were stolen by the attacker
Examples of Offences
Airways, August, September, [20]18, Fake
State:
The three categories which threats can be divided into
Threats
- DDoS
- Malware (including viruses)
- Social engineering
Explain:
DDoS attack
Threats
Attempt to make a computer or network system unavailable to users by flooding it with network traffic. A DDoS is usually focused on preventing internet website or service from either functioning efficiently, or at all. This may temporarily or indefinitely.
Explain:
Why adware is used and how it works
Threats - Malware
- Generates revenue for its author
- Any software package which automatically shows adverts, such as a pop-up, or may also be in the UI of a software package
Explain:
Why bot/botnets are used and how they work
Threats - Malware
- Bots take control of a computer system
- Type of malware that allows a cyber-security attacker to take control of a computer system that has been infected without the user’s knowledge and can result in a botnet which is an interconnected network of infected computer systems
Explain:
Why bugs are used and how they work
Threats - Malware
- Bugs areconnected to software and are the flaws that produce an unwanted outcome
- Usually result of human error during coding and can be fixed by the software creator issuing fixes or patches; security patches are the most severe and can result in attackers bypassing security
Explain:
Why ransomware is used and how it works
Threats - Malware
- Holds a system captive and demands a ransom to release it
- Restrict user access to the system by encrypting files or locking down the computer system; message usaully displayed to force user to give ransom
- Can be spread by a worm and can be started by downloading an infected file or by a vulnerability in the computer system
Explain:
Why rootkits are used and how it works
Threats - Malware
- Designed to remotely access or control a computer system without being detected by the security software or the users
- When a rootkit has been installed, it can enable an attacker to remotely access files, access/steal data and information, modify software configs, control the computer system as part of a botnet
Explain:
Why spyware is used and how it works
Threats - Malware
- Collect data from an infected computer (inc. personal info from websites)
- Usually hidden from user, and can be difficult to detect, and could be keyloggers or install additional software or redirect web browsers to different websites
Explain:
Why trojan horses are used and how they work
Threats - Malware
- Standalone malicious program designed to give full control of an infected PC to another (attacker) PC
- Often appear to be something which is wanted or needed by a user and can be hidden in valid programs and software; make copies of themselves, steal information or harm host computer
Explain:
Why viruses are used and how they work
Threats - Malware
- Virus attempts to make a computer system unreliable
- Computer program that replicates iteself and spreads from computer to computer; increase chances of spreading to other computers by infecting files on a network file system or file system that is accessed by other computers
Explain:
Why worms are used and how they work
Threats - Malware
- Standalone computer program that replicates itself so it can spread to other computers
- Worm can use a computer network to spread, unlike a computer virus it does not need to attach iself to an existing program - almost always cause some harm to a network
Explain:
Briefly, how to mitigate adware
Threats - Malware
- Install, run and keep updaed a security software package
- Do not open an files from an unkown source
- Do not click any links in an email
Explain:
Briefly, how to mitigate bot/botnet
Threats - Malware
- Install run and keep updated a security softwae package
- Do not open any files from an unkown source
- Do not click any links in an email
Explain:
Briefly, how to mitigate bugs
Threats - Malware
Check for and install any patches that are released from software vendors
Explain:
Briefly, how to mitigate ransomware
Threats - Malware
- Do not open any files from an unkown source
- Do not click any links in an email
- Install, run and update security software