week 11

5.1 Ethical issues, i.e.: • whistle blowing • disability/gender/sexuality discrimination • use of information • codes of practice • staying safe online • bias

 

5.2 Operational issues, i.e.: • security of information • health and safety • disaster planning and recovery • organisational policies (i.e. acceptable use policy, code of conduct, etc.) • change management • scale of change: o drivers (i.e. change in business practice, legislation, competition)o needs (i.e. improved networking, remote access for employees)

5.3 Threats, i.e.: • phishing • hacking • virus • Trojan • interception • eavesdropping • data theft • social engineering

5.4 Physical security, i.e.: • locks • biometrics • RFID • tokens • privacy screens • shredding • characteristics

5.5 Digital security, i.e.: • anti-virus • firewalls • anti-spyware • username/passwords • permissions • encryption • characteristics

5.6 Safe disposal of data and computer equipment, i.e.: • legislation • overwrite data • electromagnetic wipe • physical destruction


Last Updated
2018-07-17 15:35:39

Links to Learning Outcomes

Links to Assessment criteria

Understand ethical and operational issues and threats to computer systems

 


English


Maths







How 2's Coverage

Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.



Anonymous Assessment - Learners assess an anonymous piece of work containing deliberate mistakes against given success criteria.

Files that support this week


| | | | |
Week 10
Prev
Week 11
Prev

Next
Webmaster Spelling Notifications