Learning Outcome 4 ICT Security and Legislation.

?
What is White Hat hacking?
White hat hacking or "ethical hacking" is a type of software engineering without malicious intent. People who are white hat hackers are hired by businesses to test the cyber security of their company and its data.
(This is legal)
1 of 7
What is Grey Hat Hacking?
Grey hat hacking is an unethical form of hacking, although not malicious. Grey hat hacking is when someone hacks into a system to show that they can, and how weak the system is. A grey hat hacker may ask for a sum of money to fix the problem.
2 of 7
What is Black Hat Hacking?
Black hat hacking is an unethical form of hacking with malicious intent. A black hat hacker may hack into a business to steal personal data. Black hat hackers may also infect computers with malware, Such as ransomware.
(This is obviously illegal)
3 of 7
What is The Data Protection Act?
The Data Protection Act 2018 (DPA) is an act that controls how businesses use your personal data. It states that data must be used fairly, lawfully and transparently.
4 of 7
Physical Prevention Methods
An example would be keeping a computer in a locked room, or having physical hardware in safes.
5 of 7
Secure destruction of data
1. Shredding: Physically destroying any storage hardware.
2. Magnetic wipe: removing the magnetic field (data) off a storage device
6 of 7
Importance of Bias when collecting data
Bias is when someone's answer is based around their own opinion rather that facts or evidence.
Removing bias allows for valid and reliable data collection.
7 of 7

Other cards in this set

Card 2

Front

What is Grey Hat Hacking?

Back

Grey hat hacking is an unethical form of hacking, although not malicious. Grey hat hacking is when someone hacks into a system to show that they can, and how weak the system is. A grey hat hacker may ask for a sum of money to fix the problem.

Card 3

Front

What is Black Hat Hacking?

Back

Preview of the front of card 3

Card 4

Front

What is The Data Protection Act?

Back

Preview of the front of card 4

Card 5

Front

Physical Prevention Methods

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Acts, Security and Legislation resources »