Revision Q1: Explain the term HACKING?

Slides:



Advertisements
Similar presentations
IT: Communication and Impacts
Advertisements

Administration Intermediate 1 & 2 Command Words Identify 2 pieces of information included in the contract of Employment, apart from employees personal.
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
GCSE ICT Computers and the Law. Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Hectic Ethics Computer Applications Mrs. Wohleb. Objectives Students will be able to: Describe ethical considerations resulting from technological advances.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Legislation in ICT.
The Ecommerce Security Environment For most law-abiding citizens, the internet holds the promise of a global marketplace, providing access to people and.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Factors to be taken into account when designing ICT Security Policies
Opening a bank account.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
The laws Organizations are covered by lots of different laws
The Legal Framework Can you work out which slide each bullet point should go on?!
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Administrative Practices Outcome 1
Data Security GCSE ICT.
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
General Purpose Packages
Data Protection LO4: How legal, ethical, safety and security issues affect how computers should be used IR Photography would like you to create a document.
ICT Exam Techniques This is a guide on how to achieve the maximum marks on the ICT Unit 1 Examination Paper.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Section 6 Theory Software Copyright, Viruses and Hacking.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
IT security By Tilly Gerlack.
OCR Nationals Level 3 Unit 3.  To understand how the Data Protection Act 1998 relates to the data you will be collecting, storing and processing  To.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
Investigating Rights and Responsibilities at work
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
The State of Computer & Data Security in Corporations Independent Survey.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
SOCIAL ENGINEERING PART IA: HOW SCAMMERS MANIPULATE EMPLOYEES TO GAIN INFORMATION.
The health and safety act was introduced to protect the welfare of people of the workplace. Before being introduced in 1974 it was estimated that 8.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
NOTE: To change the image on this slide, select the picture and delete it. Then click the Pictures icon in the placeholder to insert your own image. Cyber.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
ANS(Prepared by: Mazhar Javed )1 Computer crime The growth of use of computerised payment systems – particularly the use of credit cards and debit cards.
Security and Privacy. 228 What might this number indicate? This is the number of mobile phones stolen in the UK every hour.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
M ORAL AND ETHICAL ISSUES. Use and Abuse of Personal and Private Data All the information stored on Computer is governed by law or legislation. The main.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
1 Assignment 3 LO This learning outcome is all about how legal, ethical, safety and security issues affect how computers should be used. All businesses.
DoS Attacks Phishing Keylogging Computer Laws/Acts.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
5.6- Demonstrate how to be a responsible consumer in the 21 st century Roll Call Question: Something that you learned in this unit.
Issues for Computer Users, Electronic Devices, Computer and Safety.
Computer Misuse Act INTRODUCTION The Computer Misuse Act became law in August Under the Act hacking and the introduction of viruses are criminal.
Information Systems Design and Development Security Precautions Computing Science.
Denial of Service Attack Pornography Phising Spoofing Salami Attack Forgery Hackers: enjoy intellectual challenges of overcoming software limitations.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Warm Up: Identity Theft: Quick Write 1. What is Identity Theft? 2. What is Fraud?
HACKING Submitted By: Ch. Leela Sasi, I M.C.A, Y11MC29011, CJJC P.G College.
Legislation in ICT.
TB2 Lesson 5 Data Protection
Cyber Security Experts
Planning and Security Policies
Legislation in ICT.
Computer Misuse Act 1990 GCSE ICT.
How it affects policies and procedures
Communicating in the IT Industry
Presentation transcript:

Revision Q1: Explain the term HACKING? Q2: Describe how the CMA (Computer Misuse Act) could be used by a business if a virus was deliberately sent to their computer network? Q3: Describe the IMPACT of having data stolen for a business? Q4: Describe how KEY LOGGING could be used by criminals? Q5: Describe one disadvantage of the use of mobile phone TRIANGULATION

Revision Q6: Describe one ADVANTAGE to a business monitoring its employees? Q7: Describe two IMPACTS on employees being monitored? Q8: Describe two IMPACTS on the employees of a business if they lose data? Q9: Explain what is meant by the term ACHIVE? Q10: When using a paper data collection form, why is it preferable to collect a person’s date of birth by asking them to fill in dd/mm/yyyy rather than asking them to write it in a blank line?

Revision ANSWERS Q1: Explain the term HACKING? A hacker is someone who finds the weaknesses in a computer system to gain unauthorised access. Q2: Describe how the CMA (Computer Misuse Act) could be used by a business if a virus was deliberately sent to their computer network? Part 3 of the CMA could be used in this case. Part 3 relates to someone illegally accessing the network with the intent to impair or with recklessness as to impairing the operation of a computer system. If the person is found then the penalty is a prison term, large fines or both.

Revision ANSWERS Q3: Describe the IMPACT of having data stolen for a business? The business would have to pay compensation to the owner of the data Customers would lose confidence in the business Q4: Describe how KEY LOGGING could be used by criminals? Criminals can use key logging on public computers to steal passwords and credit card information. Q5: Describe one disadvantage of the use of mobile phone TRIANGULATION It can invade the privacy of the user by tracking their location.

Revision Q6: Describe one ADVANTAGE to a business monitoring its employees? Audit trails can be kept It assists employees keep to the terms of the companies policies on the use of mobile devices. Q7: Describe two IMPACTS on employees being monitored? Impacts could be: Workers are able to keep on track of the work completed. Gives more productivity. Encourages some worker to work longer hours than they are contracted to do.

Revision Q8: Describe two IMPACTS on the employees of a business if they lose data? A formal warning can be given They could be demoted and salary reduced They could be dismissed from their jobs They face increase security which restricts them from doing the job fully Q9: Explain what is meant by the term ACHIVE? An achieve is a type of back up for a collection of data that is no longer needed for everyday business transactions. Q10: When using a paper data collection form, why is it preferable to collect a person’s date of birth by asking them to fill in dd/mm/yyyy rather than asking them to write it in a blank line? This format ensures all data entered is the same and can be validated