Please enable JavaScript.
Coggle requires JavaScript to display documents.
Revision Topics 2, 5 and 6 (Topic 6 ((Plenary, • Lucy and Abdi are…
Revision Topics 2, 5 and 6
Topic 2
-
-
Lifecycle of a computer
-
The systems life cycle can be broken down into five stages: Analysis, Design, Implementation, Operation, and Maintenance. ... Implementation - The construction (development) of the system; the system is developed based on the design laid out in the previous stage.
Topic 5
ID theft
ID theft only needs a name, address and
-
-
-
-
-
-
-
-
-
-
-
Data collection
-
-
-
-
• In 2018, the EU General Data Protection
-
-
-
-
-
-
-
Topic 6
Unauthorised access
-
-
-
-
-
of a system, but gains access to another part
-
-
-
-
-
Creation of malware
-
-
-
-
systems, networks or software
-
-
-
-
-
-
Case study:
In 1992, Kevin Mitnick was the most
-
-
unauthorised access to computers,
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
• Lucy wants to download the app,
-