5.1 Ethical issues, i.e.: • whistle blowing • disability/gender/sexuality discrimination • use of information • codes of practice • staying safe online • bias
5.2 Operational issues, i.e.: • security of information • health and safety • disaster planning and recovery • organisational policies (i.e. acceptable use policy, code of conduct, etc.) • change management • scale of change: o drivers (i.e. change in business practice, legislation, competition)o needs (i.e. improved networking, remote access for employees)
5.3 Threats, i.e.: • phishing • hacking • virus • Trojan • interception • eavesdropping • data theft • social engineering
5.4 Physical security, i.e.: • locks • biometrics • RFID • tokens • privacy screens • shredding • characteristics
5.5 Digital security, i.e.: • anti-virus • firewalls • anti-spyware • username/passwords • permissions • encryption • characteristics
5.6 Safe disposal of data and computer equipment, i.e.: • legislation • overwrite data • electromagnetic wipe • physical destruction
Links to Learning Outcomes |
Links to Assessment criteria |
|
---|---|---|
Understand ethical and operational issues and threats to computer systems |
Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.