IT

Cards (70)

  • GPS
    Global Positioning System, Used for Navigation & device location
  • Sharing Data
    Data about an organisation that is stored or used by another organisation, Easier to Collaborate, Work in Real time, Reduces Costs (Music), Must be protected by Law (GDPR), Data can be damaged
  • Transactional Data
    Using Transaction Data for an additional purpose, EG using Sales data to predict trends, patterns, adjust promotions, Transaction Data could be Delivery Address, Payment Details, Item Details, Order Details
  • Benefits of Email
    • Fast Communication with stakeholders & customers, Faster & Cheaper than Letters, Attach Media & Documents, Easier to keep in touch with friends and family
  • Benefits of Online Information
    • Competitor information is available eg Pricing, Research is easier online, Access to a wide variety of information and online course
  • Benefits of Online Shopping
    • Sellers can reach wider global markets, Convenience of 24/7 shopping & wider range of products, Online business cheaper to run, no overheads, shops
  • Benefits of Online Chat
    • Communicate remotely & share ideas, Brings people together, feel less lonely, Find & connect with others with similar interest
  • Benefits of Streaming
    • Access to pre-made resources, Access media 24/7 and often cheaper, Access content from around the world increasing culture
  • Technology & the Environment
    Effect of Technology on the Environment, Upgrade or Replace?, Less Paper & ink are used, Devices can monitor the environment, Manufacturing, Using & Disposing of devices uses electricity, precious materials & fossil fuels
  • Organisations cannot discriminate in hiring because of Faith or skin colour
  • Organisations cannot produce content that is offensive to a group or individual
  • Organisations must provide employees with adequate accessibility tools to do their job
  • Organisations cannot discriminate in hiring because of Age or Gender
  • Net Neutrality
    All data on the Internet is treated equally, Prevents choice of Product or service being limited by the ISP, smaller businesses can compete with larger businesses, Prevents user data being sold to advertisers, Free speech, Prevents ISP from blocking illegal or dangerous content, reduces ISP Profit, prevents development of services
  • Data Protection Act 1998 / GDPR
    Data Held about a living person must be: Collected for specific purpose, Adequate & relevant, Accurate & Up to date, Kept Secure to prevent loss/damage, Not kept longer than necessary
  • Data Subjects Rights
    The individual whose personal data is being stored has the right to: Access & correct the data, Prevent the data used to make Automatic Decisions, Cause Distress or Advertising, Right to Complain & Compensation
  • Digital Footprint
    The trail you leave when using different websites on the internet, This includes social media, online shopping, email
  • Third Party Cookies
    Track online activity across different websites, Used by advertisers to track interests and target ads, Searching on Amazon shows adds on Facebook
  • Right to be Forgotten
    Free to live their life without being treated unfairly because of an action or comment made in the past, Remove copies of, links to, data held about them
  • Copyright, Designs and Patents Act 1988

    Copyright - Illegal to copy and distribute Music, Films, Software, Books without permission, Trademark - Protects words, sign or logo that identifies a brand or company, Patent - Protects a new idea or invention
  • Creative Commons licensing
    Copyright owners allow their work to be copied & modified while still keeping the copyright: Attribution - copyright owner must be given credit, Non-commercial - no profit can be made from it, No derivative works - cannot be modified, Share-alike - must be covered by an identical licence
  • Computer Misuse Act 1990
    Misuse of computers and communications systems: 1 - Unauthorised access to a computer systems, eg looking at someone else's files, 2 - Unauthorised access with intent to commit crime, eg wanting to change a bank balance, 3 - Unauthorised access and modifying data, eg Malware or changing bank balance, 3a - Create, store or distribute Malware
  • Malware
    Malicious Software that self-replicates and causes loss of data
  • Malware prevention
    • Anti-malware software
    • Don't download from unknown sources/links
  • Types of malware
    • Virus (replicates)
    • Worm (via networks)
    • Trojan (harmless file creates 'backdoor')
  • Spyware
    Software that gathers data and sends it to a 3rd party
  • Spyware prevention
    • Anti-spyware software
    • Firewall
    • Don't download from unknown sources/links
  • Keylogger

    Records actions and keys pressed
  • Denial of Service Attack
    Overloads server with requests, unable to process legitimate requests
  • Denial of Service Attack prevention
    • Firewall
    • Network forensics
  • Botnet
    Trojan Horse infected machines used to perform attack
  • Ransomware
    Malware used to encrypt/lock device until a fee is paid
  • WannaCry attack in 2017 attacked 200,000 computers worldwide including the NHS
  • Social Engineering / Phishing
    Tricking & Deception to acquire personal data, e.g. emails/links to fake websites
  • Social Engineering / Phishing prevention
    • Staff Training & Network Policy
    • Anti-spam filters
    • Strong Passwords
  • Social Engineering / Phishing techniques
    • Shoulder Surfing
    • Phishing
    • Pharming
    • Pretexting
    • Dumpster Diving
  • Data Interception & Theft

    Data is Stolen or Intercepted by 3rd Party
  • Man in the Middle Attack
    Intercepts communication between two parties
  • Data Interception & Theft prevention
    • Encryption
    • Avoid free open WiFi
  • Data Interception & Theft methods
    • Packet sniffing
    • Steal memory stick