Chapter 7

Descripción

ICT Mapa Mental sobre Chapter 7, creado por green.george el 10/04/2013.
green.george
Mapa Mental por green.george, actualizado hace más de 1 año
green.george
Creado por green.george hace alrededor de 11 años
97
0

Resumen del Recurso

Chapter 7
  1. Acts
    1. Data Protection Act 1998 (DPA)
      1. Data must be obtained fairly and lawfully
        1. Data can only be held for lawful purposes
          1. Personal data should be relevant
            1. Data must be accurate and kept up-to-date
              1. Not be kept for longer than necessary
                1. Data must be processed in accordance with rights of subject (request and view)
                  1. Appropriate security measures. (CANT BE TRANSFERRED)
                  2. Computer Misuse Act 1990 (CMA)
                    1. Punishment
                      1. 1 - 6 months Large fine
                        1. 2 - 5 year Large fine
                          1. 3 - 5 year Large fine
                            1. 3a - 5 year unlimited fine
                            2. Crime
                              1. 1 - Unauthorised access
                                1. 2 - Unauthorised access with intent for crime
                                  1. 3 - Unauthorised modification (edit/delete)
                                    1. 3a - Making/Suppliying/Obtaining virus or worms
                                  2. Copyright, Designs and Patents Act (CDPA)
                                    1. rewards to creators
                                      1. Protect them from theft/copy
                                        1. Licenses
                                          1. Single user
                                            1. Multi user
                                              1. Site
                                            2. Regulation of Investigatory Powers Act 2000 (RIPA)
                                              1. Organisations can intercept communication
                                                1. Prevent and detect crimes
                                                  1. Breach of trust/privacy (especially in businesses)
                                                  2. Electronic Communications Act 2000 (ECA)
                                                    1. Cryptography service providers
                                                      1. Allows e-signatures
                                                        1. Can be hacked
                                                      2. Freedom of Information Act 2005 (FIA)
                                                        1. Public authority transparency
                                                          1. Anyone can request info.
                                                            1. Increased accountability
                                                              1. A body does not have to confirm or deny the existence of information
                                                            2. Networks
                                                              1. P2P - all connected devices have equal status
                                                                1. No need for expensive server equipment
                                                                  1. Each person managers their own system
                                                                    1. Set up with wizards
                                                                      1. Security and anti-virus responsibility of user
                                                                        1. Data can be stored on any computer
                                                                          1. Each computer performing multiple tasks
                                                                          2. Client Server - Powerful controlling computer manages peripherals and security
                                                                            1. Back up, security and anti-virus are centralised
                                                                              1. Network processing is central
                                                                                1. Shared data stored centrally
                                                                                  1. Server and network OS cost money
                                                                                    1. Network site manager
                                                                                      1. Too much reliance on mainframe
                                                                                    2. Health & Safety
                                                                                      1. Safety
                                                                                        1. Trailing wires
                                                                                          1. Fire
                                                                                            1. Electric shock
                                                                                              1. Unstable tables/chairs
                                                                                                1. Food/Drink
                                                                                                2. Health
                                                                                                  1. RSI
                                                                                                    1. Carpal tunnel
                                                                                                      1. Eye strain
                                                                                                        1. Back pain
                                                                                                          1. Fatigue
                                                                                                            1. Stress
                                                                                                          2. ICT and society
                                                                                                            1. Communications
                                                                                                              1. E-mail
                                                                                                                1. Telephone
                                                                                                                  1. Internet
                                                                                                                  2. Systems
                                                                                                                    1. Fast
                                                                                                                      1. Remote
                                                                                                                        1. We demand too much
                                                                                                                        2. Organisations
                                                                                                                          1. Commerce
                                                                                                                            1. Medicine
                                                                                                                              1. Education
                                                                                                                              2. Security
                                                                                                                                1. Physical e.g. biometrics locks
                                                                                                                                  1. Encryption - cypher key
                                                                                                                                    1. Firewall - incoming/outgoing conections
                                                                                                                                      1. Auditing - logs find patters
                                                                                                                                    Mostrar resumen completo Ocultar resumen completo

                                                                                                                                    Similar

                                                                                                                                    Types and Components of Computer Systems
                                                                                                                                    Jess Peason
                                                                                                                                    Input Devices
                                                                                                                                    Jess Peason
                                                                                                                                    Output Devices
                                                                                                                                    Jess Peason
                                                                                                                                    Networks
                                                                                                                                    Will8324
                                                                                                                                    General ICT Quiz
                                                                                                                                    leahshaw
                                                                                                                                    ICT Revison Flash Cards
                                                                                                                                    Arun Johal
                                                                                                                                    FLAT FILE VS RELATIONAL DATABASE
                                                                                                                                    rosiejones
                                                                                                                                    Online World - Learning Aim A
                                                                                                                                    andysedge
                                                                                                                                    Business Aims and ICT Strategies
                                                                                                                                    scrt
                                                                                                                                    User Interfaces
                                                                                                                                    Skeletor
                                                                                                                                    General ICT Quiz
                                                                                                                                    Jade Fantom