BCS Business Processes Flashcards

1
Q

What is the computer misuse act?

A

The CM act protects personal data held by organisations from unauthorised access to computer material.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the data protection act?

A

The DPA protects the privacy of data held on individuals by businesses and other organisations. It makes sure the user has access to their data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the GPDR?

A

General Data Protection Regulation

It protects European Union customer data, and hopes to reduce the severity of security breaches of personal data on the web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is ISO 27001?

A

International Standard for an ISMS (Information Security Management System)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is an ISMS

A

A system for managing information security effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Give me an example of how a business uses ISO 27001

A

regulating passwords for users

Controlling access to online sites

Managing the risk of supplies.
e.g. 3rd party providers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Give me an example of using the computer misuse act?

A

Hacking into someones device

unauthorised access to someones files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Give an example of using the data protection act

A

Having unauthorised access to confidential information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the first 4 data protection principle acts?

A
  1. ) Personal data shall be processed fairly and lawfully
  2. ) Personal data must be obtained and processed for specified lawful purposes.
  3. ) Personal data shall be adequate, relevant and not excessive.
  4. ) Personal must be accurate and kept up to date.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the last 4 data protection principle acts?

A
  1. ) Personal data shall not be kept for any longer than is necessary.
  2. ) Personal data shall be processed in accordance with the rights of data subjects.
  3. ) Personal data must be kept safe and secure at all times.
  4. ) Personal data shall not be transferred outside the European area unless sufficient protection is ensured.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Who enforces the data protection act?

A

The Information Commissioner’s Office (ICO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the difference between on premise and off premise?

A

On Premise: A solution hosted in house and usually supported by a third party.

Off Premise: A solution hosted by a third party and usually supported by a different third party.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define Infrastructure as a service (IaaS)?

A

A service model that delivers computer infrastructure to support operations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define Software as a serivce (Saas)?

A

A software distribution model in which a 3rd party provider hosts applications and makes them available to customers over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define Platform as a service (PaaS)

A

A Cloud computing model in which a 3rd party provider delivers hardware and software tools to users over the internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the difference between Agile and Waterfall methods of software development?

A

The Agile method is known for its flexibility.

The waterfall method is structured towards software development.

17
Q

what is the GDPR

A

General Data Protection Regulation

The legal framework that sets guidelines for the collection and processing of personal information from individuals who live in the European Union (EU).

18
Q

How many principles are in the GDPR

A

7.

  1. ) Lawfulness, fairness and transparency
  2. ) Purpose Limitation
  3. ) Data Minimisation
  4. ) Accuracy
  5. ) Storage Limitation
  6. ) Integrity and Confidentiality
  7. ) Accountability
19
Q

What is a standard operating procedure (SOP)

A

a set of step-by-step instructions compiled by an organization to help workers carry out complex routine operations.

SOPs aim to achieve efficiency, quality output and uniformity of performance, while reducing miscommunication

20
Q

Give me some examples of confidential information

A
  • bank details,
  • contact information
  • date of birth, name and age
21
Q

What is confidential information

A

any information or document that a business or individual wishes not to make public.

22
Q

What is not classed as non-confidential information

A

Any information or document which is open to the public.

23
Q

What is an example of non-confidential information

A

Census records

24
Q

What are the benefits of using SOP’s

A
  • Efficiency
  • Save on Training Costs
  • simplify performance management
25
Q

What is a disaster recovery plan

A

a plan for business continuity in the event of a disaster that destroys part or all of a business’s resources, including IT equipment, data records and the physical space of an organization.

26
Q

What is an IT disaster recovery plan

A

The plan should include a strategy to ensure that all critical information is backed up. Identify critical software applications and data and the hardware required to run them. Prioritize hardware and software restoration.

Document the IT disaster recovery plan as part of the business continuity plan.

27
Q

what is the freedom of information act 2000?

A

A right of access to all types of recorded information held by most UK public authorities

28
Q

What are the 8 principles of data protection?

A
  1. ) Fair and Lawful
  2. ) Specific for its purpose
  3. ) Be adequate
  4. ) Accurate and up to date
  5. ) Not kept no longer than needed
  6. ) Take into account peoples rights
  7. ) Kept safe and secure
  8. ) Not to be transferred outside the EU