Unit 2 - Section 13 - Safety and security of ICT systems

View mindmap
  • Safety and security of ICT systems
    • Threats to ICT systems
      • Employees
        • Malpractice: When an employee goes against the company ICT code of practice
      • Human Error
        • Crime: When individuals or organisations break the law by using computers to illegally access computer systems
      • Viruses
        • A piece of malicious software that replicates itself and is used to corrupt and delete files
      • Spyware
      • Reasons for security breaches
        • Personal gain, e.g a student chnaging their grade
        • Financial gain
        • Sabotage
        • For the satisfaction, trying to show off to others
      • Controlling threats
        • Passwords, deny access to all unauthorised users
        • Firewalls
        • Data encryption
        • Conventioanl encryption
        • Digital signatures, used to verify that a document is genuine
        • Secure Secret Layer
    • How are ict systems protected?
      • Hardware measures
      • Software measures
      • Procedures
    • Legislation to protect ICT systems
      • Data Protection Act 1998
        • Regulates how personal data is used and protects data subjects from the misuse of their personal data.
        • Gives people the right to see what data organisations have about them.
      • Computer Misuse Act
        • The act identifies three specific offenses:
          • Unauthorised acces to a computer just to prove you can gain access, not to commit any further offenses
          • Unauthorised access with the intent to commit further offenses e.g obtaining personal data.
          • Unauthorised modification of computer material
      • Copyright, Designs and Patents Act 1988


No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Safety and security of ICT systems resources »