Please enable JavaScript.
Coggle requires JavaScript to display documents.
LO5 - Coggle Diagram
LO5
5.1 Ethical issues
Whistle Blowing - This is when you speak about anything that company may be engaging which can be seen as illegal
Code of Practice - These are the general rules within a company that all of the employees must follow and abide to.
-
Disability Discrimination - This would be judging someone unfairly based a physical characteristic that someone may have .
-
The Data Protect Act - The Data Protection Act protects the privacy and integrity of data held on individuals by businesses and other organisations.
The Computer Misuse Act - The act makes the following illegal: Unauthorised access to computer material.
5.4 Physical Security
-
Biometrics - These devices require the input of a human characteristic such as a fingerprint retina or voice scan.
RFID - Radio frequency identification ,RFID is usually used within security tags to permit access of authorised people to certain people
Token - This is two factor authentication to ensure that you are a the correct user of whatever account that you may own
Privacy Screen - This is a thin plastic screen which goes over your screen which blocks people from looking at your screen
-
5.5 Digital security
Anti-virus - This can be used to protect you from the threat of viruses. It identifies which sources may contain viruses and which may not
Firewall - This software downloaded onto your computer system which stops certain data packets from entering your network
Anti-Spyware - Prevents spyware from being installed onto your computer which is used to monitor you using your computer
-
Encryption - This is when data is scrambled when it is stored in a database making data unreadable for those without the key to decrypt the data
5.2 Operational issues
Data Loss -Data loss would be unexpectedly losing confidential information kept private within a business
-
Illegal duplication of Data - This is making copies of confidential information without the consent for the person who originally owns the data.
-
5.3 Threats
Phishing - This is when you mislead individuals or organisations into giving up sensitive information
Trojan - appears to be a useful or well known program but when used or downloaded allows the attacker access to your system.
Virus - A virus can replicate itself and spread from system to system by attacking itself to infected files that are downloaded and opened, Once activated a virus can modify data or corrupt a system.
Hacking - Exploiting weaknesses in a system or network to create view modify or delete files without permission
-