Created by ebanks.amber
about 11 years ago
|
||
Question | Answer |
When combating computer crime, what do logical methods do? | Restrict access to the material on the the computer using computer-based mehtods |
What are some examples of logical methods to prevent computer crime? | -usernames and passwords -access rights -user groups -screensaver passwords -firewalls -anti-virus software |
What is a user ID? | -a unique identifier for the user, identifying who the user is to the system -can be allocated to groups -can also restrict the user form only logging onto certain machines or at certain times -can also be used to log what the user is doing |
What is a password? | -A method of restricting access -unless you know the password you cannot perform tasks -when used with used ID, authenticates who the user is |
What are some forms of authentication? | textual: passwords biometric: fingerprint/voice/retina |
How do access rights work? | Different users/groups will have different powers on computer material e.g. some groups may only be able to read files, while other groups have edit or delete access |
What controls might be used on passwords to make them harder for people to find out? | -using a minimum number of characters -using a combination of numbers and letters -not using a word in the dictionary -changing passwords regularly -restricting the number of attempts -making the password impersonal |
Explain the term auditing? | -A method of looking over logs -logs can be created for events that occur on the network : users logging in, applications run, websites visited, emails sent etc -A log can be used to build up a user profile |
What is a firewall? | -A hardware and/or software gate between two networks or between a system and a network the filters the data transferred based on security policies. -used on computers that connect to the internet to prevent unauthorised access to the system or network the computer is part of |
What is the purpose of encryption? | -To prevent anyone who has the data being able to understand it without the appropriate key |
What is encryption? | -The process of taking plain text and applying an algorithm to it to turn it into encrypted text -Only someone with a key should be able to convert the encrypted back into plain text |
What is a computer that is not connected to any other computer said to be? | stand-alone |
What are two or more computers connected together? | a network |
What are the advantages of networking? | -peripherals (printers/scanners) can be shared, reducing costs -Data can be shared, files can be available from a central source. Allows several people to work on the same document -The resources used by individuals can be monitored and logged -Backup and virus checks can be controlled from a central location -Users can communicate with email systems |
What are the disadvantages of networking? | -All the services a network provides become unavailable if the network fails without adequate contingency in place -If one workstation has a virus, the network can cause it to spread -A busy network may effect what the user can do |
What is a professional body? | -A formal group that is set up to oversee a particular area of industry |
Why might networking be an advantage to management but not employees? | Management can see what the users are doing and if they are working by monitoring employees . However employees may not want everything they do monitored |
What roles and benefits to professional bodies offer: | -Promotes education and training (liaises with universities to make sure they provide the skills required in an industry) -Sets standards for the employees within the industry -Provides examinations -Provides publications and discussion papers so members can keep up to date -Holds conferences -Provides input into legislation and the industry |
What are the advantages, for a network manager, of joining a professional body? | -career recognition( accredited qualification the present and future employees recognise) -networking (meet with specialists in different areas) -knowledge and best practise (access to the latest industry news) |
What are the disadvantages, for a network manager, of joining a professional body? | -you will need to follow their code of conduct -there is a cost to joining a professional body and maintaining the subscription |
What are three health problems related to working in ICT? | -Carpal tunnel syndrome (pressure on the median nerve in the wrist) -Repetitive strain injury (chronic pain experienced in the arms, shoulder or back) -Eye strain (hazy vision, tired eyes) |
What are the causes and prevention of Carpal tunnel syndrome? | -Caused by repeated wrist movements such as typing -Prevented by avoiding the repetitive actions and frequent breaks between actions |
What are the causes and prevention of Repetitive strain injury? | -Caused by repetitive actions, poor posture while working and maintaining a fixed forced position -Prevented by keyboard rests, foot stools, adjustable chairs and frequent breaks form continuous activity |
What are the causes and prevention of eye strain? | -Caused by looking at a monitor for long periods of time and dehydration of the eyes -Prevented by the intake of fluids and frequent breaks |
What are three safety problems related to working in ICT? | -Trailing wires (wires from computers trailing from desks and along floors) -Electric shock (Water and electricity can cause an electric shock/Touching bare wires) -Food and drink ( Liquids can cause shorting and lead to fire) |
How can the safety hazard of trailing wires be prevented? | Cable management systems to cover wires |
How the safety hazard of electric shock be prevented? | -no drinking near computers -no liquids near computers -all wires to be frequently checked and prepared |
How can the safety hazard of food and drink be prevented? | no eating and drinking near computers |
What are the advantages of the use of ICT systems? | -computers can perform the same actions over and over again very quickly and reliably -computers can search large volumes of data very quickly -computers can perform tasks that are impossible or dangerous to humans |
What are the disadvantages of the use of ICT systems? | -hardware is developing at a phenomenal pace so the same amount of money will purchase twice the speed or storage it did two years previously -software and hardware limits what can be done -more and more bandwidth is demanded |
How has ICT changed society? | -internet shopping (24 hours a day) -computers help people with hearing a sight disabilities -easier to she medical research -electronic registers in schools -accessing work from home -internet access offers a wide range of information |
What are the benefits of The regulation of investigatory Powers Act? | -companies can monitor what employees do -ensures facilities are being used for legitimate purposes -limits employees ability to share company secrets |
What are the problems of The Regulation of Investigatory Powers Act? | -monitoring may be seen as a breach of trust -also concerns about how much an organisation can monitor communication |
What is the purpose of The Electronic Communications Act? | to create a legal frame work so that people can be sure about the origin and integrity of communications |
What are the two main parts of the Electronic Communications Act? | -Cryptography (allows government to set up a register of 'approves cryptography suppliers') -Facilitation of electronic commerce, data storage (recognises digital signatures as admissible in law) |
What are the benefits of the Electronic Communications Act? | -contract signed over the internet have the same legality as those signed by hand -increased security for e-commerce -the e-commerce contracts have legal backing |
What are the problems of the Electronic Communications Act? | -there is still legalisation to remove many of the laws that prevent digital signatures being accepted (buying and selling houses/wills) -there will always be a security risk |
What is the Freedom of Information Act? | allows anyone to be able to find out information on any topic from any public authority |
What are the benefits of the Freedom of Information Act? | -increased information available to the general public -increases the accountability for companies |
What are the problems of the Freedom of Information Act? | -you can request any information, but some information may be withheld to protect various interests -information requested under the wrong Act will delay the information being received -the public authority does not have t confirm or deny existence of the information requested |
What are the methods for combating computer crime? | logical methods physical methods |
When combating computer crime what do physical methods do? | prevent a person from gaining access to a computer in person |
What are the physical methods that can be used to stop computer crime? | -security guards at the door and giving employees a pass to be checked -An automatic door that responds to a pass -keeping the computers in locked rooms -security cameras -finger print scanning -alarms |
what are six main rights under the Data Protection Act? | -Right to subject access -Right to prevent processing likely to cause damage or distress -Right to prevent processing for the purpose of direct marketing -Rights in relation to automated decision making -Right to compensation if damage and distress is suffered by the Act being contravened -Right to rectify, block or erase incorrect data |
Explain what is meant by the Right to subject access: | you are allowed to see what information is being held on by a company this involves contacting the data controller and can take time |
What is meant by the Right to prevent processing for the purpose of direct marketing? | -direct marketing is mail sent to you advertising goods and services -you can request that it be stopped |
What are reasons for exemption from the Data Protection Act? | -national security -crime and taxation (you cannot see your records) -health, education and social work (may cause harm) -domestic purposes (data held on your own computer) |
What are the three principles of the Data Protection Act that must be followed? | -Personal data shall be processed fairly and lawfully -Personal data shall be accurate and, where necessary, kept up to date -Personal data shall be processed in accordance with the rights of data subjects under this Act |
What is the purpose of the Computer Misuse Act? | to protect data held by companies from hackers |
What are the four main provisions of the Computer Misuse Act? | -Unauthorised access to computer material (entering a computer system without permission) -Unauthorised access with intent to commit or facilitate the commission of further offenses (entering and transmitting illegal material) -Unauthorised acts with intent to impair, or with recklessness as to impairing, operation of a computer (changing content) -Making, supplying or obtaining articles for use in computer misuse offences (modifying original code) |
What are benefits of the Computer Misuse Act? | allows companies a legal resource if their security has been compromised |
What are the problems of the Computer Misuse Act? | -there has to be intent -difficult to identify a culprit -only reinforced once the crime has been committed |
What is the purpose of the Copyright, Designs and Patents Act? | to make it illegal to steal or create unauthorised copies of software (and books, CDs and music) |
What are the benefits of the Copyright, Designs and Patents Act? | -allows those who invest time and money in creating the actual software to reap the rewards in terms of royalties |
What are the problems of the Copyright, Designs and Patents Act? | -you don't buy the software only a license to use it, licenses vary, and can be difficult to understand the terms in which it has been purchased |
What is the purpose of The Regulation of investigatory Powers Act? | -makes it a criminal offence to monitor communications without lawful authority |
Why may organisations want to monitor and record communications? | - to make sure regulations are being up held -in the interests of national security -to detect or investigate unauthorised use of telecommunications systems |
Under what circumstances may an organisation monitor calls but not record them? | -received communications to determine whether they are business or personal communications -communications made to anonymous telephone help lines |
What is the purpose of the Data Protection Act? | -to protect individuals from organisations -to limit the data held by organisations to only that which they need -to stop organisations holding excessive quantities of data on individuals for which they do not have an immediate purpose |
Want to create your own Flashcards for free with GoConqr? Learn more.