Please enable JavaScript.
Coggle requires JavaScript to display documents.
LO5 - Coggle Diagram
LO5
Operational issues
Security information
ensuring data is securely stored of minimise the chance of data loss, corruption or manipulation
-
Disaster recovery
A plan to ensure all data and company is kept safe and secure incase of a disaster with holding before whilst and after plan
-
-
-
-
Threats
-
Hacking
exploiting weaknesses in a system or network to create, view or delete files without permission
Trojan
Appears to be useful or well-known program but when inst5alled it secretly gives the attacker a backdoor to your system
Interception
Data packets on a network are intercepted by a third party and copied, edited or transferred to a different location than the intended destination
-
Data theft
Taking or copying data or files from a server , network or PC
Social engineering
Tricking individuals into giving sensitive information such as claiming to be from an IT department and asking for personal information such as passwords and usernames to check for viruses
Physical security
-
-
-
-
Privacy screen
Physical - thin piece of plastic that goes on your monitor preventing peope being able to see the screen from an angle
-
Ethical issues
whistle blowing
A current or past employee that reports the misconduct of an organization. It could be something that has occurred in the past, is ongoing or planned for the future.
Disability/ Gender
Being prejudiced against someone because of a disability, their gender or sexuality.
use of information
How personal information is gathered stored, used and disseminated.
codes of practice
A set of written guidelines or ethical standards that detail how people working in a particular job role / profession should behave
staying safe inline
To maximize the personal safety of a user against security risks, to provide information and/or property associated with using the internet, as well as protection form cyber crime in general.
Digital security
Anti virus
software that is created specially to help detect, prevent and remove malware
-
Firewalls
monitors incoming and outgoing network traffic and decides whether to allow it to pass through based on the specific security rules