Global Information

?
  • Created by: base12
  • Created on: 05-01-22 11:23
Information Styles
Text, Graphics
Video, Animated Graphics
Numerical, Audio
Textile Image, Subtitles
Tables and spreadsheets
Braille, Boolean
Graphs and charts
1 of 38
Information classification
Sensitive, non-sensitive
private, public
personal, business
confidential, classified
anonymized
2 of 38
Information categories
Communication
Education and training
Entertainment
Planning
Financial
Research
Location dependent
3 of 38
Information formats
Web pages
Blogs
Podcast
Streamed audio and video
Social media channels
Emails
Document stores
RSS feed
4 of 38
Data types and sources
External and internal
Primary and secondary
Qualitative and quantitative
5 of 38
External Source
Information outside of an organisation:
Government reports
Financial data
Competitors
Price list from suppliers
6 of 38
Internal Source
Information within an organisation:
Financial reports
Data analysis
Employee surveys
7 of 38
Primary Data
Collected by yourself or another employee within an organisation.
8 of 38
Secondary Data
Collected by someone outside of the organisation
9 of 38
Qualitative Data
Descriptive data often composed of text that can be observed but not measured.
10 of 38
Quantitative Data
Measured data often in the form of numbers, percentage or statistics.
11 of 38
Information systems
Open Information System (OIS)
Close Information System (CIS)
12 of 38
Open Information System (OIS)
Interact with other information system to exchange data even from different platforms.
Risk of data loss and/or hacking
13 of 38
Close Information System (CIS)
System is private and cannot exchange data with other systems.
Access limited but it is so much more secure.
14 of 38
Holders of Information
Business, Government
Individual, Education
Healthcare, Charity &Community
15 of 38
Comparison of locations
Developed vs. Developing Countries
Urban vs. rural
Internet Access from remote location
16 of 38
Storage Media
Magnetic
Optical
Solid State
Paper
17 of 38
Access & Storage Devices
Handheld
Portable
Fixed
Shared
18 of 38
WWW Technologies
World Wide Web
Internet
Intranet
Extranet
19 of 38
Network Characteristics
Speed
Security
Access Levels
Accessibility
20 of 38
Information Formats
Web Pages
Blogs
Podcast
Streamed Audio & Video
Social Media Channels
Emails
Document Stores
RSS Feeds
21 of 38
Internet
Advantage for Individuals
Increased speed of personal communication
easy access to information
24/7 access to services
social interaction with others
22 of 38
Internet
Disadvantage for Individuals
Potential for identity theft
Cost of connection and services
source of distraction
cyberbullying and trolling
spreading misinformation
23 of 38
Internet
Advantage for Organisation
share data quickly globally
online services always available
easy internal communication
open up the workplace
24 of 38
Internet
Disadvantage for Organisation
Malicious attacks and threats
cost of maintaining services
reputation and controversies
25 of 38
Information Characteristics
Valid
Biased
Reliable
Relevant
Accurate
26 of 38
Data
unprocessed facts or statistics that have no context
27 of 38
Information
data that has been processed organised and structured into contect
28 of 38
Stages of Data Analysis
Identify the need
Define the scope
Identify potential sources
Source and select information
Select the most appropriate tools
Process and analyse data
Record and store information
Share result
29 of 38
UK Legislations
Data Protection Act (2018)/GDPR
Computer Misuse Act (1990)
Freedom of Information Act (2000)
Regulation of Investigatory Powers Act (20000)
Copyright, Design & Patents Act (1988)
Information Commissioner's Office (ICO) Codes of Practice, Protection of Fre
30 of 38
Global Legislation
Data Protection Outside of the UK
EU-US Privacy Shield
UNCRPD
31 of 38
Data Flow Diagram
External Entity
Process
Data Flow
Data Store
32 of 38
Security Principles
Confidentiality
Integrity
Availability
33 of 38
Risks
Unauthorised Access to Data
Accidental Loss of Data
Intentional Destruction of Data
Intentional Tampering with Data
34 of 38
Impacts
Loss of Intellectual Property
Loss of Service and Access
BReach of Confidential Information
Loss of Third Party Data
Loss of Reputation
Identity Theft
Threat to National Security
Recent Examples of Security Failure
35 of 38
Protection Measures
Staff Responsibilities
Disaster & Recovery Planning
Assessment and Effectiveness
36 of 38
Physical Protection
Locks
Biometrics
Security Staff
Backup
Shredding
RFID & Tokens
37 of 38
Logical Protection
Username and Password
Anti-Malware
Firewall
Encryption
Tiered Level of Access
Obfuscation
38 of 38

Other cards in this set

Card 2

Front

Sensitive, non-sensitive
private, public
personal, business
confidential, classified
anonymized

Back

Information classification

Card 3

Front

Communication
Education and training
Entertainment
Planning
Financial
Research
Location dependent

Back

Preview of the back of card 3

Card 4

Front

Web pages
Blogs
Podcast
Streamed audio and video
Social media channels
Emails
Document stores
RSS feed

Back

Preview of the back of card 4

Card 5

Front

External and internal
Primary and secondary
Qualitative and quantitative

Back

Preview of the back of card 5
View more cards

Comments

No comments have yet been made

Similar Computing resources:

See all Computing resources »See all Global Information resources »