Unit 1 Lo5 issues and security Flashcards

1
Q

What is Whistle Blowing?

A

When a member of staff reveals that the organisation they work for is engaging in unlawful practices. This could include breaking privacy laws, threatening staff, or environmental damage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Discrimination?

A

When an employee is treated unfairly because of a personal or physical characteristic over which they have no control. The Equality Act (2010) ensures equal treatment for all people irrespective of:
- race
- sexuality
- gender
- disability
- marital status

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the Use of Information?

A

Laws such as GDPR (General Data Protection Regulation) and specifically the Data Protection Act (2018) ensure that organisations must responsibly process personal data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Codes of Practice?

A

A set of rules which explains how people working in certain professions are required to behave. Organisations may have a code of practice for:
- Confidentiality
- Quality assurance
- Behaviour
- Equality and discrimination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Bias?

A

This is technically correct, but slanted, information that presents a one-sided view. For example, end-of-year financial data that focuses on profits and ignores significant losses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

security of information operational issues

A

organisations must ensure that data is stored securely to minimise the chances of data loss, corruption or unauthorised manipulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

disaster and recovery planning operational issues

A

-all possible risks analysed
-preventative measures taken into analysis
-staff training
-contingency planning
-recovery measures
-replacement hardware
-software reinstalled

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

organisational polices

A

creating polices that outline acceptable CVOMPUTER NETWORJK USE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

CHAGINING MANAGEMNT

A

formal approach by organisation lead a change in the way the business or project is run

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

scale of change
change drivers

A

companies must stay up to date with times and new technology
change drivers;
new legislation
new competitors
economic
social changes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

scale of change
change needs

A

companies change needs and focus of organisation are alert over time
change needs;
new equipment
customer interaction
workplace shift

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

phishing

A

misleading individual into giving up sensitive info through email

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

hacking

A

exploiting weaknesses in system or network to create view modify or delete files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

trojan

A

appears useful nut when downloaded gives attacker backdoor to your system where access data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

interception

A

data packets on network intercepted by third party copied edited transferred to different location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

eavesdropping

A

interception in real time private communication traffic such as instant messages or video calls

17
Q

social engineering

A

tricking individuals into giving sensitive info e.g. claiming t be in IT department

18
Q

virus

A

virus can replicate itself and spread from system to system. once activated virus can modify data or corrupt a system so stops working

19
Q

physical security
biometrics

A

require human characteristic like fingerprint iris or voice scan

20
Q

physical security shredding

A

cutting up documents into small pieces

21
Q

physical security RFID AND Tokens

A

radio frequency identification uses electromagnetic fields to attach tag to physical objects

22
Q

physical security privacy screens

A

plastic screens placed over a monitor to obscure the screen

23
Q

digital security
anti malware

A

anti virus scans system and remove viruses
anti spyware removes spyware on infected system

24
Q

digital security
firewall

A

prevent unauthorised access to or from a network

25
digital security encryption
conversation of data in unreadable format so cannot be understood if intercepted
26
permissions
creation of different levels of file access so only authorised people can access and change certain files
27
legislation waste electronic and electrical equipment WEEE directive
guidance on how hazardous materials should be disposed safety
28
legislation waste acceptance criteria WAC
equipment must meet rules before can be sent to landfill, hazardous materials such as elements in computer monitors do not meet criteria and cannot be accepted
29
legislation hazardous waste directive
ensure businesses safely store hazardous materials and use authorised businesses to dispose of waste
30
legislation data protection act
data should only be kept for a reasonable amount of time until securely deleted checked regularly and permanently deleted if no longer required
31
methods of data and system disposal overwriting
new data is written to hard disk drive to replace current data resetting the data
32
methods of data and system disposal electromagnetic wiping
uses machine called degausser which has strong electromagnetic coil to completely wipe the hard disk drive
33
methods of data and system disposal physical destruction
physically destroying computer system or storage device like hard disk drive which guarantees data permanently inaccessible