Paper 1 Unit 4 Flashcards
When should work stations be assessed?
Every time a workstation is set up or changes are made
When a new employee starts with the company
For employees working from home
If an employee complains of any discomfort or pain
What requirements are there for work stations?
Adjustable chairs
Adjustable lighting
Adjustable tilt and swivel monitors
Space around the keyboard for other devices and monitors
How can a work environment be made safe for all staff?
Places to eat, drink water and use toilet and wash facilities
Good ventilation and reasonable working temperature with sufficient lighting
Regular maintenance of buildings and equipment
Floors and corridors free of trip and other hazards
Suitable fire procedures and escape routes
What are the principles of the data protection act?
- Data should be processed fairly and lawfully
- Data should be used only for specific purposes and not disclosed to other parties without notable permission
- Data should be relevant and not excessive
- Data should be accurate and up to date
- Data should be kept for as long as it is necessary
- Individuals have the right to check what data is stored about them and update it when necessary
- Security must be in place to prevent unauthorised access to the data
- Data may not be transferred outside of the EU unless the country in question has adequate data protection legislation
What are the key principles of the General Data Protection Regulation (GDPR)
- Lawfulness, fairness and transparency- there must be valid reasons for collecting and using personal data
- Purpose limitation- the purpose for collecting and using personal data must be clear from the start
- Data minimisation- data must be adequate, relevant and limited to what is necessary
- Accuracy- all reasonable steps must be taken to ensure that data is not incorrect or misleading
- Storage limitation- data must not be held for longer than necessary
- Security- adequate measures are in place
- Accountability- the holder must take responsibility
What does the computer misuse act label as criminal offences?
Unauthorised access to computer materials
Unauthorsied access to computer materials with the intent to commit or facilitate further offences
Unauthorised access with the intent to harm or break a computer system
Making, supplying or obtaining any articles for use in a malicious act using a computer
Unauthorised acts causing or creating risk of serious damage
Why do people hack?
Ethical hackers have permission from companies to find vulnerabilities in systems so they can be fixed
Hacktivists break systems for politically or socially motivated reasons
Some people report faults to owners for a free but since they have unauthorised access, it is illegal
Criminal hackers have intent to cause damage or make financial gain
What are the consequences of hacking a company?
Personal or sensitive data could be stolen and used to defraud people. This affects the victims of the crime and the reputation of the company and may bring a fine.
DDoS attacks can render an organisation’s web presence as unusable with there being a consequential loss of business and repuation.
Malware attacks that lock systems and threaten to delete data if a ransom us nor paid can place a significant burden on the organisation and paying the ransom does not guarantee the data will be released.
What are the different types of malware attacks?
Virus, worm, trojan, ransomware, spyware, pharming
What are the different types of social engineering?
Phishing, pretexting, shouldering
What other forms of attack can take place on a business?
Brute force attack, DDoS attack
What characteristics are protected from discrimination by the Equality Act?
Age, disability, gender reassignment, marriage and civil partnership, pregnancy and maternity, race, religion or belief, sex, sexual orientation
How does the intellectual property act protect people’s work?
Unregistered designs protection provides the right to prevent others copying a design. Registered designs protection goes further providing full control of a design
How can digital technologies be used to monitor the workplace?
Monitoring electronic communications, monitoring systems, secret monitoring
What international laws apply to designing, developing and using digital systems?
EU Digital services act
US CAN-SPAM Act
EU Digital Marketing Act