q1: explain the term hacking? q2: describe how the cma (computer misuse act) could be used by a...

6
Revision Q1: Explain the term HACKING? Q2: Describe how the CMA (Computer Misuse Act) could be used by a business if a virus was deliberately sent to their computer network? Q3: Describe the IMPACT of having data stolen for a business? Q4: Describe how KEY LOGGING could be used by criminals? Q5: Describe one disadvantage of the use of mobile phone TRIANGULATION

Upload: paula-eaton

Post on 19-Jan-2016

217 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Q1: Explain the term HACKING? Q2: Describe how the CMA (Computer Misuse Act) could be used by a business if a virus was deliberately sent to their computer

RevisionQ1: Explain the term HACKING?

Q2: Describe how the CMA (Computer Misuse Act) could be used by a business if a virus was deliberately sent to their computer network?

Q3:Describe the IMPACT of having data stolen for a business?

Q4: Describe how KEY LOGGING could be used by criminals? Q5: Describe one disadvantage of the use of mobile phone

TRIANGULATION

Page 2: Q1: Explain the term HACKING? Q2: Describe how the CMA (Computer Misuse Act) could be used by a business if a virus was deliberately sent to their computer

RevisionQ6: Describe one ADVANTAGE to a business monitoring its

employees?

Q7: Describe two IMPACTS on employees being monitored?

Q8: Describe two IMPACTS on the employees of a business if they lose data?

Q9: Explain what is meant by the term ACHIVE?

Q10: When using a paper data collection form, why is it preferable to collect a person’s date of birth by asking them to fill in dd/mm/yyyy rather than asking them to write it in a blank line?

Page 3: Q1: Explain the term HACKING? Q2: Describe how the CMA (Computer Misuse Act) could be used by a business if a virus was deliberately sent to their computer

RevisionANSWERS

Q1: Explain the term HACKING?

A hacker is someone who finds the weaknesses in a computer system to gain unauthorised access.

Q2: Describe how the CMA (Computer Misuse Act) could be used by a business if a virus was deliberately sent to their computer network?

Part 3 of the CMA could be used in this case. Part 3 relates tosomeone illegally accessing the network with the intent to impair orwith recklessness as to impairing the operation of a computer system.If the person is found then the penalty is a prison term, large fines orboth.

Page 4: Q1: Explain the term HACKING? Q2: Describe how the CMA (Computer Misuse Act) could be used by a business if a virus was deliberately sent to their computer

RevisionANSWERS

Q3: Describe the IMPACT of having data stolen for a business?

• The business would have to pay compensation to the owner of the data• Customers would lose confidence in the business

Q4: Describe how KEY LOGGING could be used by criminals? Criminals can use key logging on public computers to steal passwords and

credit card information.

Q5: Describe one disadvantage of the use of mobile phone TRIANGULATION

It can invade the privacy of the user by tracking their location.

Page 5: Q1: Explain the term HACKING? Q2: Describe how the CMA (Computer Misuse Act) could be used by a business if a virus was deliberately sent to their computer

RevisionQ6: Describe one ADVANTAGE to a business monitoring its employees?

• Audit trails can be kept• It assists employees keep to the terms of the companies policies on the

use of mobile devices.

Q7: Describe two IMPACTS on employees being monitored?

Impacts could be:• Workers are able to keep on track of the work completed.• Gives more productivity.• Encourages some worker to work longer hours than they are contracted

to do.

Page 6: Q1: Explain the term HACKING? Q2: Describe how the CMA (Computer Misuse Act) could be used by a business if a virus was deliberately sent to their computer

RevisionQ8: Describe two IMPACTS on the employees of a business if they lose

data?

• A formal warning can be given• They could be demoted and salary reduced• They could be dismissed from their jobs• They face increase security which restricts them from doing the job fully

Q9: Explain what is meant by the term ACHIVE?

An achieve is a type of back up for a collection of data that is no longer needed for everyday business transactions.

Q10: When using a paper data collection form, why is it preferable to collect a person’s date of birth by asking them to fill in dd/mm/yyyy rather than asking them to write it in a blank line?

This format ensures all data entered is the same and can be validated