Chapter 7

Description

ICT Mind Map on Chapter 7, created by green.george on 10/04/2013.
green.george
Mind Map by green.george, updated more than 1 year ago
green.george
Created by green.george about 11 years ago
97
0

Resource summary

Chapter 7
  1. Acts
    1. Data Protection Act 1998 (DPA)
      1. Data must be obtained fairly and lawfully
        1. Data can only be held for lawful purposes
          1. Personal data should be relevant
            1. Data must be accurate and kept up-to-date
              1. Not be kept for longer than necessary
                1. Data must be processed in accordance with rights of subject (request and view)
                  1. Appropriate security measures. (CANT BE TRANSFERRED)
                  2. Computer Misuse Act 1990 (CMA)
                    1. Punishment
                      1. 1 - 6 months Large fine
                        1. 2 - 5 year Large fine
                          1. 3 - 5 year Large fine
                            1. 3a - 5 year unlimited fine
                            2. Crime
                              1. 1 - Unauthorised access
                                1. 2 - Unauthorised access with intent for crime
                                  1. 3 - Unauthorised modification (edit/delete)
                                    1. 3a - Making/Suppliying/Obtaining virus or worms
                                  2. Copyright, Designs and Patents Act (CDPA)
                                    1. rewards to creators
                                      1. Protect them from theft/copy
                                        1. Licenses
                                          1. Single user
                                            1. Multi user
                                              1. Site
                                            2. Regulation of Investigatory Powers Act 2000 (RIPA)
                                              1. Organisations can intercept communication
                                                1. Prevent and detect crimes
                                                  1. Breach of trust/privacy (especially in businesses)
                                                  2. Electronic Communications Act 2000 (ECA)
                                                    1. Cryptography service providers
                                                      1. Allows e-signatures
                                                        1. Can be hacked
                                                      2. Freedom of Information Act 2005 (FIA)
                                                        1. Public authority transparency
                                                          1. Anyone can request info.
                                                            1. Increased accountability
                                                              1. A body does not have to confirm or deny the existence of information
                                                            2. Networks
                                                              1. P2P - all connected devices have equal status
                                                                1. No need for expensive server equipment
                                                                  1. Each person managers their own system
                                                                    1. Set up with wizards
                                                                      1. Security and anti-virus responsibility of user
                                                                        1. Data can be stored on any computer
                                                                          1. Each computer performing multiple tasks
                                                                          2. Client Server - Powerful controlling computer manages peripherals and security
                                                                            1. Back up, security and anti-virus are centralised
                                                                              1. Network processing is central
                                                                                1. Shared data stored centrally
                                                                                  1. Server and network OS cost money
                                                                                    1. Network site manager
                                                                                      1. Too much reliance on mainframe
                                                                                    2. Health & Safety
                                                                                      1. Safety
                                                                                        1. Trailing wires
                                                                                          1. Fire
                                                                                            1. Electric shock
                                                                                              1. Unstable tables/chairs
                                                                                                1. Food/Drink
                                                                                                2. Health
                                                                                                  1. RSI
                                                                                                    1. Carpal tunnel
                                                                                                      1. Eye strain
                                                                                                        1. Back pain
                                                                                                          1. Fatigue
                                                                                                            1. Stress
                                                                                                          2. ICT and society
                                                                                                            1. Communications
                                                                                                              1. E-mail
                                                                                                                1. Telephone
                                                                                                                  1. Internet
                                                                                                                  2. Systems
                                                                                                                    1. Fast
                                                                                                                      1. Remote
                                                                                                                        1. We demand too much
                                                                                                                        2. Organisations
                                                                                                                          1. Commerce
                                                                                                                            1. Medicine
                                                                                                                              1. Education
                                                                                                                              2. Security
                                                                                                                                1. Physical e.g. biometrics locks
                                                                                                                                  1. Encryption - cypher key
                                                                                                                                    1. Firewall - incoming/outgoing conections
                                                                                                                                      1. Auditing - logs find patters
                                                                                                                                    Show full summary Hide full summary

                                                                                                                                    Similar

                                                                                                                                    Types and Components of Computer Systems
                                                                                                                                    Jess Peason
                                                                                                                                    Input Devices
                                                                                                                                    Jess Peason
                                                                                                                                    Output Devices
                                                                                                                                    Jess Peason
                                                                                                                                    Networks
                                                                                                                                    Will8324
                                                                                                                                    General ICT Quiz
                                                                                                                                    leahshaw
                                                                                                                                    ICT Revison Flash Cards
                                                                                                                                    Arun Johal
                                                                                                                                    FLAT FILE VS RELATIONAL DATABASE
                                                                                                                                    rosiejones
                                                                                                                                    Online World - Learning Aim A
                                                                                                                                    andysedge
                                                                                                                                    Business Aims and ICT Strategies
                                                                                                                                    scrt
                                                                                                                                    User Interfaces
                                                                                                                                    Skeletor
                                                                                                                                    General ICT Quiz
                                                                                                                                    Jade Fantom