topic 5 cont

?
What is phishing?
Trying to get details of banking and card details using an ict system
1 of 15
What are trojans?
small programs used to get details of your user- IDs and passwords
2 of 15
What is identity theft?
stealing information of you e.g. bank details in order to commit fraud
3 of 15
What should encryption be used for?
- sending credit card details - on-line banking - confidential e-mails
4 of 15
what are the problems with encyption?
can be used for secret conversations between criminals and terrorists
5 of 15
Data contoller
The person whose responsibility it is in an organisation to control the way that personal data is processed
6 of 15
Data subject
The living individual whom the personal information is about
7 of 15
Personal data
Data about a living person that is specific to that person
8 of 15
Name 4 of the 8 principles of the DPA
- only obtained for one or more specified purpose and none othe -accurate - relevant -not kept for any longer than what is necessary
9 of 15
What are the exemptions from notification are there ?
if the data is personal and for recreational use,
10 of 15
what exemptions from access is there?
data used to prevent, dectect crime or convict offenders
11 of 15
What does the DPA do ?
protct personal data from misuse
12 of 15
What does the CMA do?
to prevent computers and data being misused and damaged or altered
13 of 15
What are the three offences under the CMA?
1. the intent to gain unauthorised access to any computer 2. The intent to commit any further ofense with any information gained e.g. identity theft 3. any act that causes an unauthorised modification of the contents of any computer
14 of 15
What does the CDPA do ?
Prevents piracy so that peoples software ect. is protected
15 of 15

Other cards in this set

Card 2

Front

What are trojans?

Back

small programs used to get details of your user- IDs and passwords

Card 3

Front

What is identity theft?

Back

Preview of the front of card 3

Card 4

Front

What should encryption be used for?

Back

Preview of the front of card 4

Card 5

Front

what are the problems with encyption?

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »