Chapter 7

Description

ICT (Chapter 7) Flashcards on Chapter 7, created by ebanks.amber on 12/04/2013.
ebanks.amber
Flashcards by ebanks.amber, updated more than 1 year ago
ebanks.amber
Created by ebanks.amber about 11 years ago
87
0

Resource summary

Question Answer
When combating computer crime, what do logical methods do? Restrict access to the material on the the computer using computer-based mehtods
What are some examples of logical methods to prevent computer crime? -usernames and passwords -access rights -user groups -screensaver passwords -firewalls -anti-virus software
What is a user ID? -a unique identifier for the user, identifying who the user is to the system -can be allocated to groups -can also restrict the user form only logging onto certain machines or at certain times -can also be used to log what the user is doing
What is a password? -A method of restricting access -unless you know the password you cannot perform tasks -when used with used ID, authenticates who the user is
What are some forms of authentication? textual: passwords biometric: fingerprint/voice/retina
How do access rights work? Different users/groups will have different powers on computer material e.g. some groups may only be able to read files, while other groups have edit or delete access
What controls might be used on passwords to make them harder for people to find out? -using a minimum number of characters -using a combination of numbers and letters -not using a word in the dictionary -changing passwords regularly -restricting the number of attempts -making the password impersonal
Explain the term auditing? -A method of looking over logs -logs can be created for events that occur on the network : users logging in, applications run, websites visited, emails sent etc -A log can be used to build up a user profile
What is a firewall? -A hardware and/or software gate between two networks or between a system and a network the filters the data transferred based on security policies. -used on computers that connect to the internet to prevent unauthorised access to the system or network the computer is part of
What is the purpose of encryption? -To prevent anyone who has the data being able to understand it without the appropriate key
What is encryption? -The process of taking plain text and applying an algorithm to it to turn it into encrypted text -Only someone with a key should be able to convert the encrypted back into plain text
What is a computer that is not connected to any other computer said to be? stand-alone
What are two or more computers connected together? a network
What are the advantages of networking? -peripherals (printers/scanners) can be shared, reducing costs -Data can be shared, files can be available from a central source. Allows several people to work on the same document -The resources used by individuals can be monitored and logged -Backup and virus checks can be controlled from a central location -Users can communicate with email systems
What are the disadvantages of networking? -All the services a network provides become unavailable if the network fails without adequate contingency in place -If one workstation has a virus, the network can cause it to spread -A busy network may effect what the user can do
What is a professional body? -A formal group that is set up to oversee a particular area of industry
Why might networking be an advantage to management but not employees? Management can see what the users are doing and if they are working by monitoring employees . However employees may not want everything they do monitored
What roles and benefits to professional bodies offer: -Promotes education and training (liaises with universities to make sure they provide the skills required in an industry) -Sets standards for the employees within the industry -Provides examinations -Provides publications and discussion papers so members can keep up to date -Holds conferences -Provides input into legislation and the industry
What are the advantages, for a network manager, of joining a professional body? -career recognition( accredited qualification the present and future employees recognise) -networking (meet with specialists in different areas) -knowledge and best practise (access to the latest industry news)
What are the disadvantages, for a network manager, of joining a professional body? -you will need to follow their code of conduct -there is a cost to joining a professional body and maintaining the subscription
What are three health problems related to working in ICT? -Carpal tunnel syndrome (pressure on the median nerve in the wrist) -Repetitive strain injury (chronic pain experienced in the arms, shoulder or back) -Eye strain (hazy vision, tired eyes)
What are the causes and prevention of Carpal tunnel syndrome? -Caused by repeated wrist movements such as typing -Prevented by avoiding the repetitive actions and frequent breaks between actions
What are the causes and prevention of Repetitive strain injury? -Caused by repetitive actions, poor posture while working and maintaining a fixed forced position -Prevented by keyboard rests, foot stools, adjustable chairs and frequent breaks form continuous activity
What are the causes and prevention of eye strain? -Caused by looking at a monitor for long periods of time and dehydration of the eyes -Prevented by the intake of fluids and frequent breaks
What are three safety problems related to working in ICT? -Trailing wires (wires from computers trailing from desks and along floors) -Electric shock (Water and electricity can cause an electric shock/Touching bare wires) -Food and drink ( Liquids can cause shorting and lead to fire)
How can the safety hazard of trailing wires be prevented? Cable management systems to cover wires
How the safety hazard of electric shock be prevented? -no drinking near computers -no liquids near computers -all wires to be frequently checked and prepared
How can the safety hazard of food and drink be prevented? no eating and drinking near computers
What are the advantages of the use of ICT systems? -computers can perform the same actions over and over again very quickly and reliably -computers can search large volumes of data very quickly -computers can perform tasks that are impossible or dangerous to humans
What are the disadvantages of the use of ICT systems? -hardware is developing at a phenomenal pace so the same amount of money will purchase twice the speed or storage it did two years previously -software and hardware limits what can be done -more and more bandwidth is demanded
How has ICT changed society? -internet shopping (24 hours a day) -computers help people with hearing a sight disabilities -easier to she medical research -electronic registers in schools -accessing work from home -internet access offers a wide range of information
What are the benefits of The regulation of investigatory Powers Act? -companies can monitor what employees do -ensures facilities are being used for legitimate purposes -limits employees ability to share company secrets
What are the problems of The Regulation of Investigatory Powers Act? -monitoring may be seen as a breach of trust -also concerns about how much an organisation can monitor communication
What is the purpose of The Electronic Communications Act? to create a legal frame work so that people can be sure about the origin and integrity of communications
What are the two main parts of the Electronic Communications Act? -Cryptography (allows government to set up a register of 'approves cryptography suppliers') -Facilitation of electronic commerce, data storage (recognises digital signatures as admissible in law)
What are the benefits of the Electronic Communications Act? -contract signed over the internet have the same legality as those signed by hand -increased security for e-commerce -the e-commerce contracts have legal backing
What are the problems of the Electronic Communications Act? -there is still legalisation to remove many of the laws that prevent digital signatures being accepted (buying and selling houses/wills) -there will always be a security risk
What is the Freedom of Information Act? allows anyone to be able to find out information on any topic from any public authority
What are the benefits of the Freedom of Information Act? -increased information available to the general public -increases the accountability for companies
What are the problems of the Freedom of Information Act? -you can request any information, but some information may be withheld to protect various interests -information requested under the wrong Act will delay the information being received -the public authority does not have t confirm or deny existence of the information requested
What are the methods for combating computer crime? logical methods physical methods
When combating computer crime what do physical methods do? prevent a person from gaining access to a computer in person
What are the physical methods that can be used to stop computer crime? -security guards at the door and giving employees a pass to be checked -An automatic door that responds to a pass -keeping the computers in locked rooms -security cameras -finger print scanning -alarms
what are six main rights under the Data Protection Act? -Right to subject access -Right to prevent processing likely to cause damage or distress -Right to prevent processing for the purpose of direct marketing -Rights in relation to automated decision making -Right to compensation if damage and distress is suffered by the Act being contravened -Right to rectify, block or erase incorrect data
Explain what is meant by the Right to subject access: you are allowed to see what information is being held on by a company this involves contacting the data controller and can take time
What is meant by the Right to prevent processing for the purpose of direct marketing? -direct marketing is mail sent to you advertising goods and services -you can request that it be stopped
What are reasons for exemption from the Data Protection Act? -national security -crime and taxation (you cannot see your records) -health, education and social work (may cause harm) -domestic purposes (data held on your own computer)
What are the three principles of the Data Protection Act that must be followed? -Personal data shall be processed fairly and lawfully -Personal data shall be accurate and, where necessary, kept up to date -Personal data shall be processed in accordance with the rights of data subjects under this Act
What is the purpose of the Computer Misuse Act? to protect data held by companies from hackers
What are the four main provisions of the Computer Misuse Act? -Unauthorised access to computer material (entering a computer system without permission) -Unauthorised access with intent to commit or facilitate the commission of further offenses (entering and transmitting illegal material) -Unauthorised acts with intent to impair, or with recklessness as to impairing, operation of a computer (changing content) -Making, supplying or obtaining articles for use in computer misuse offences (modifying original code)
What are benefits of the Computer Misuse Act? allows companies a legal resource if their security has been compromised
What are the problems of the Computer Misuse Act? -there has to be intent -difficult to identify a culprit -only reinforced once the crime has been committed
What is the purpose of the Copyright, Designs and Patents Act? to make it illegal to steal or create unauthorised copies of software (and books, CDs and music)
What are the benefits of the Copyright, Designs and Patents Act? -allows those who invest time and money in creating the actual software to reap the rewards in terms of royalties
What are the problems of the Copyright, Designs and Patents Act? -you don't buy the software only a license to use it, licenses vary, and can be difficult to understand the terms in which it has been purchased
What is the purpose of The Regulation of investigatory Powers Act? -makes it a criminal offence to monitor communications without lawful authority
Why may organisations want to monitor and record communications? - to make sure regulations are being up held -in the interests of national security -to detect or investigate unauthorised use of telecommunications systems
Under what circumstances may an organisation monitor calls but not record them? -received communications to determine whether they are business or personal communications -communications made to anonymous telephone help lines
What is the purpose of the Data Protection Act? -to protect individuals from organisations -to limit the data held by organisations to only that which they need -to stop organisations holding excessive quantities of data on individuals for which they do not have an immediate purpose
Show full summary Hide full summary

Similar

Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
Output Devices
Jess Peason
Networks
Will8324
General ICT Quiz
leahshaw
ICT Revison Flash Cards
Arun Johal
FLAT FILE VS RELATIONAL DATABASE
rosiejones
Online World - Learning Aim A
andysedge
Business Aims and ICT Strategies
scrt
User Interfaces
Skeletor
General ICT Quiz
Jade Fantom