Please enable JavaScript.
Coggle requires JavaScript to display documents.
LO5 (5.2 Operational issues (Data Loss - - Data loss is an error condition…
LO5
5.2 Operational issues
Data Loss
- - Data loss is an error condition in information systems in which information is destroyed by failures or neglect in storage, transmission, or processing
Data Corruption
- - Data corruption refers to errors in computer data that occur during writing, reading, storage, transmission, or processing, which introduce unintended changes to the original data.
Block Viruses/Malware, Shut down System Properly
Illegal duplication of Data
- - unauthorized copying of an organization's internally developed software
Encryption on files
.
Stolen Data
- - is the illegal transfer or storage of any information that is confidential, personal, or financial in nature, including passwords, software code
Encryption on files.
Manipulated Data
- - A data manipulation language is a computer programming language used for adding, deleting, and modifying data in a database.
Hacked Data
- - data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted environment.
Encrypt to keep your stuff unreadable
5.1 Ethical Issues
Disability/ Gender/ Sexuality discrimination
Disability - a physical or mental condition that limits a person's movements, senses, or activities.
Gender - either of the two sexes (male and female), especially when considered with reference to social and cultural differences rather than biological ones.
Sexuality discrimination - Sex discrimination involves treating someone (an applicant or employee) unfavorably because of that person's sex.
Whistle Blowing
A whistleblower is a person who exposes secretive information or activity that is deemed illegal, unethical, or not correct within a private or public organization.
advice can you give to someone to ensure they are safe online -
Create Complex Passwords, Boost your Network Security, Use a Firewall.
5.3 Threat Tasks
Phishing, Hacking, Virus, Trojan Horse
Phishing
- - fraudulent practice of sending emails in order to induce individuals to reveal personal information, such as passwords and credit card numbers.
Hacking
- - the gaining of unauthorized access to data in a system or computer.
Virus
- - malicious software program loaded onto a user's computer without the user's knowledge, inserting itself onto other programs or files, infecting them in the process.
Trojan Horse
- - a program designed to breach the security of a computer system while ostensibly performing some innocuous function.
5.4 Physical Security
Locks, Biometrics, RFID: - Radio Frequency Identification,Tokens, Privacy screen, Shredding
Locks
- - A door lock will be used to prevent anyone with unauthorised access to that room.
Biometrics
- -
Fingerprint
- recognising a person based on their fingerprint to give them access this is good because no one has identical fingerprints.
Iris
- recognising a person from their eyes to allow them access to curtain places.
Voice
- recognising a person from their voice giving their access.
Face
- a face scan which recognises and gives them access.
RFID: - Radio Frequency Identification
- - electromagnetic fields to automatically identify and track tags attached to objects.
Tokens
- - It is a small hardware device that the owner carries to authorize access to a network service. The device may be in the form of a key fob
Privacy screen
- - placed over a computer screen to prevent screen visibility from any angle other than straight on.
Shredding
- - destroying documents that has personal information like your name, address, phone number, social security number, or bank account information
5.5 Digital Security
Anti-Virus, FireWall, Anti-Spyware, Encryption
Anti-Virus
- - types of malicious software, such as keyloggers, browser hijackers, Trojan horses, worms, rootkits, spyware, adware, botnets and ransomware.
FireWall
- - system designed to prevent unauthorized access to or from a private network.
5.6 Safe disposal of Data and computer equipment document
Legislation, Overwrite Data, Electromagnetic Wipe, Physical Destruction
Legislation
- - laws, considered collectively.
Overwrite Data
- - overwriting is the process of replacing old information with new information.
Electromagnetic Wipe
- - reduce or eliminate an unwanted magnetic field (or data) stored on tape and disk media such as computer and laptop hard drives
Physical Destruction
- - can involve shredding hard drives, smartphones, printers, laptops and other storage media into tiny pieces by large mechanical shredders.