Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Understanding Data Protection and Network Security: A Comprehensive Guide, Quizzes of Software Development Methodologies

Definitions and explanations of various terms related to data protection and network security. Topics include the data protection act, personal data, rights of data subjects, computer misuse act, network security, physical security, software security, and user access. Learn about the importance of data protection and the measures to ensure data security.

What you will learn

  • What is the Computer Misuse Act and what are its penalties?
  • What is biometric security and how is it used in a security system?
  • What is the Data Protection Act and what are its purposes?
  • What rights do data subjects have under the Data Protection Act?
  • What are the Data Protection Principles?

Typology: Quizzes

2014/2015

Uploaded on 05/08/2015

abigail-willis
abigail-willis šŸ‡¬šŸ‡§

4 documents

1 / 13

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
TERM 1
An Invoice
DEFINITION 1
A document issued by a seller to a buyer relating to a sale
Indicates the products quantities & agreed prices
A Bill
TERM 2
Invoicing System Characteristics
DEFINITION 2
Characteristics
Stores details about: Products,customers,past invoices
Produce quotations for products and services
Produce an invoice based on an order
Send automatic reminders to customers for payment
Send payment receipts to customers
Record payments against invoices
TERM 3
Booking System
DEFINITION 3
Customer can select product/flight/holiday required
Select the date and time
Check Availability
Check Price
Can change options
Make a credit/debit card payment
System stores customer/product details
Data can be used by company
TERM 4
Route Finding Systems
DEFINITION 4
Software that allows the user to ente r a variety of information
about the start and destination of a jo urney.
Route can be requested and printed out prior to the journey
and from the organisations website or through the use of a
satnav.
With an in-car system, it is possible to change the route mid
journey.
Some systems can automatically rec eive the traffic
information.
TERM 5
Route Finding Systems Characteristics
DEFINITION 5
Will find a route from an origin to a desti nation
Will offer alternative routes for the user to choos e from.
Software produces information on:
suggested route
Suggested Travel time
Distance to destination
Toll Charges
Estimated fuel costs
Alternative routes
pf3
pf4
pf5
pf8
pf9
pfa
pfd

Partial preview of the text

Download Understanding Data Protection and Network Security: A Comprehensive Guide and more Quizzes Software Development Methodologies in PDF only on Docsity!

An Invoice

A document issued by a seller to a buyer relating to a sale

Indicates the products quantities & agreed prices

A Bill

TERM 2

Invoicing System Characteristics

DEFINITION 2

Characteristics

Stores details about: Products,customers,past invoices

Produce quotations for products and services

Produce an invoice based on an order

Send automatic reminders to customers for payment

Send payment receipts to customers

Record payments against invoices

TERM 3

Booking System

DEFINITION 3

Customer can select product/flight/holiday required

Select the date and time

Check Availability

Check Price

Can change options

Make a credit/debit card payment

System stores customer/product details

Data can be used by company

TERM 4

Route Finding Systems

DEFINITION 4 Software that allows the user to enter a variety of information about the start and destination of a journey. Route can be requested and printed out prior to the journey and from the organisations website or through the use of a satnav. With an in-car system, it is possible to change the route mid journey. Some systems can automatically receive the traffic information. TERM 5

Route Finding Systems Characteristics

DEFINITION 5 Will find a route from an origin to a destination Will offer alternative routes for the user to choose from. Software produces information on: suggested route Suggested Travel time Distance to destination Toll Charges Estimated fuel costs Alternative routes

Tailored system Interface

Modifying standard software to suit a particular application or user Usually Involves adding form controls Advantages: -Application is simplified Less mistakes made by novice users Faster to enter data & make choices Disadvantages: Level of knowledge required to create & test the interface Time taken to modify the interface Simplified interface may restrict advanced users TERM 7

House Style

DEFINITION 7 A set of rules followed on all documents The public will become familiar with an organisations house style House Style Features Fonts to be used The different paragraph styles the layout of documents any graphics that can be used the company's colour scheme may be utilised Logos are part of a companies house style TERM 8

Design Considerations

DEFINITION 8 Layout of the screen - Uncluttered

  • Consistent Logical order for screen items - To aid user data entry Relevance - Only requires minimum input from, the user
  • Concise and useful information on screen Choice of font - Size & style must be easy to read Colours - Different colours to highlight information
  • Shouldn't clash TERM 9

Design Considerations

DEFINITION 9

Validation Checks - can only enter appropriate data

Visual & audible cues - error messages that are clear &

useful

  • audio feedback to confirm input/action

Graphics & animation - Kept to a minimum

Help options - useful, clear and in simple language

TERM 10

Master Slide

DEFINITION 10 A slideshow presentation 'Style sheet' - created by an employee/organisation Identifies: The theme to be used for the presentation - background colour.. position of graphics to be shown on each slide - E.g.company logo The position of information to appear on each slide - Header/footer, date, slide number Text formatting - font type, size, colour

Templates Disadvantages

User is limited to the templates available

If a mistake has been made on the template: - error will

appear on every document created from the template

The standard user cannot alter template

If a template layout changed only later documents

change

TERM 17

Modelling System & Reasons for

modelling

DEFINITION 17

Modelling is often known as simulation

Reasons for Modelling

To predict the response of a system

To save cost

To change the timescale of a system

To remove the element of danger

To speed up and assist the design process

TERM 18

Characteristics of Modelling Software

DEFINITION 18 A model usually consists of a series of rules-The rules usually written as mathematical expressions-The rules determine how the model will behave in various situations-The rules work on data fed into the model The model should behave in the same way as the situation that it represents The designer uses the model to predict how whatever it is modelling will behave in reality TERM 19

Advantages of using spreadsheets to create

and run simulations

DEFINITION 19 Most organisations already own spreadsheet software-Not likely to be any cost in purchasing spreadsheet software-Less training will be required Can enter variable (Text and Numbers)into a cell Formulae & Functions perform calculations on the variables Graphs can be used to present the data Conditional formatting can be used to highlight outcomes What-If analysis can be used to answer what-if questions TERM 20

Disadvantages of using spreadsheets to

create and run simulations

DEFINITION 20

Can take a lot of timeto create

Require mathematical skills to set up

Only as accurate as the rules that have been set up within

it

Can only be used for mathematical simulations

Tables (Relational Database Terminology)

Aka: An entity

A collection of data about a certain 'Thing'

A collection of records in a relational database

Tables Contain: -Rows & Columns

A relational database is made up of a number of tables

The name of a table is usually capitalised

TERM 22

Records & Fields (Relational Database

Terminology)

DEFINITION 22 Records A record is a row in a database table Contains all the data about a single item or event Records are made up of a number of fields Each Record contains individual items of data Fields Aka: An attribute An individual data item within a record A column in a database record TERM 23

Primary Key & Standard Notation (Relational

Database Terminology)

DEFINITION 23 Primary Key Primary key is field that identifies a record uniquely Used to create a relationship between tables Used to prevent data duplication Standard Notation Entities are written in capital letters Attributes are written with an initial capital Primary keys are underlined Foreign keys are over lined TERM 24

Referential Integrity & Duplicate Data

(Relational Database Terminology)

DEFINITION 24 Referential Integrity Every foreign key must have a related primary key value-If a customer record is deleted then all 'hires' by the deleted customers are removed Ensures no redundant data is stored Duplicate Data More than 1 copy of a data record Data taking up more storage space than necessary Possible data inconsistency TERM 25

Overhead Transparencies Advantages

DEFINITION 25

Only need OHP - no computer/projector

OHTs are more reliable

Can skip slides and go back with little trouble

You can write on an OHT

Don't need to be confident with the software

What is a graphic library?

Collections of specific images related to a topic

Often used in a computer aided design

Manufacturers often produce images of their products

TERM 32

The Data Protection Act Data Privacy

DEFINITION 32 The right to privacy is a right we all expect We do not expect personal details such as our age, medical records, personal family details, political and religious beliefs to be freely available to everybody With the growth of ICT, large databases are able to hold huge quantities of information Global networks are able to share and distribute this information around the world in seconds TERM 33

Data Protection Act

DEFINITION 33 In order to control this development and to protect peoples right to privacy, the data protection act was introduced. The first act became law in 1984 but has been updated by the 1998 act If any person, organisation, company or business wishes to hold personal information about people, they must register wit the office of the information commissionrt TERM 34

Purposes of the Data Protection Act

DEFINITION 34 To place regulations on the use of personal data To allow individuals to access data held about them To protect individuals from misuse of their own personal data To meet EU regulations To allow UK citizens to access data held on them in other EU countries To allow prosecution off companies that break the DPA TERM 35

Data Protection Principles

DEFINITION 35 To be processed fairly and lawfully To be obtained and specific and lawful purposes To be adequate, relevant and not excessive for the purpose To be accurate and up-to-date Not to be kept longer than necessary Be processed within the rights of data subjects To be kept secure against loss, damage and unauthorised and unlawful processing Not to be transferred to countries outside the European economic area

Personal Data & What it

includes

It must relate to living people who can be identified

We are all data subjects

This includes

Racial or ethnic origins

Political opinions

Religious beliefs

Whether members of Trade Unions

Their physical or mental health or condition

Sexual Life

TERM 37

Rights of Data Subjects

DEFINITION 37 Be given a copy of data held-You're allowed to see what information is being held about you by a company-You will need to pay an administrative charge Prevent processing of the data if it is likely to cause damage or distress Prevent the data being used for direct marketing- junk mail Have data corrected, blocked and erased if inaccurate TERM 38

Computer Misuse Act &

Penalties

DEFINITION 38 To deter unauthorised access To allow prosecution and punishment for offenders Three offences were defined: Unauthorised computer access Unauthorised modification or deletion of data Unauthorised access with intent to commit further offenses Penalties Hacking - Maximum fine of 2000 & 6 months prison sentence Spreading Viruses - Unlimited fine and a maximum five year prison sentence TERM 39

The Copyright, Designs & Patents

Act

DEFINITION 39

law dealing with illegal copying

The Act was introduced to protect the investment of tie,

money and effort by the people who create original

pieces of work

Covered by the Act:

Authors of books

Composers of mu

TERM 40

Network Security

DEFINITION 40

ICT crime often deliberate act of theft-Stealing Data-

Stealing software or equipment

Natural disasters and mistakes by humans can also cause

data to be lost or equipment to be damaged

Networked computers are prone to security problems:-

Hacking -Viruses, spyware and malware

Biometric Security

Technology used to measure some feature of a person-In

order to identify them within a security system

Fingerprint

Voice or facial recognition

DNA

TERM 47

Software Patches/Updates &

Viruses

DEFINITION 47 Corrects loopholes & bugs in software Must regularly update virus data files-So new viruses can be detected Regular security patches to operating systems & Applications Viruses A virus is a piece of software that is designed to: -Cause deliberate harm to data stored on a computer Removable media used in an infected system can then carry a virus to another machine Programs downloaded from the internet can also spread virus TERM 48

Anti-Spyware

DEFINITION 48

What?:

Collects information about a person or organisation

Can track a users keystrokes-To find out what is being

typed, including passwords

Why?:

Can be used to pass information on to advertisers

Can be used to find out usernames and passwords

TERM 49

Access Rights and Levels of

Access

DEFINITION 49 Data is commercially valuable - could be stolen May want to restrict access to data Different users are given different access rights to data Legal restrictions on the access to personal data NONE- User cannot obtain info nor change dataREAD ONLY-User can obtain Information but not change the dataREAD/WRITE-User can change data as well as obtain informationAPPEND ONLY-User cannot change existing data but can add new dataFULL-Can perform all operations TERM 50

User Ids &

Passwords

DEFINITION 50

Allow access to user areas-Stop unauthorised access-

Protect data

To make individual users members of groups-Allow access

to files based on access rights

To be able to monitor use - audit logs

To comply with the law

User IDs

User IDs

Must be unique

Can be suspended when user is away

Can be linked to resources

TERM 52

Passwords

DEFINITION 52

Passwords

Network Manager:- Force password change frequently-

Make minimum length password-Must contain numbers

and letters-Cannot reuser passwords

User:-Not writing the password down-Make it something

others cant guess - not personal -Make sure no one is

looking when you type it

TERM 53

Safety Problems - Trailing Wires

DEFINITION 53 If trailing cables are near where somebody walks then they are a trip hazard Also possible that somebody could disconnect the wrong equipment Cables should not be stretched across desks, doorways or thoroughfares Cable management used to keep cables out of the way:-Floor Trunking-False floors and ceilings -Desk portholes -Spiral cable covers TERM 54

Risk of Fire and Avoiding Risk of Fire

DEFINITION 54 Overloaded sockets can use too much current -Which can lead to overheating and potentially a fire Electrical equipment can develop faults over time Avoiding Risk of Fire Electrical sockets should not be overloaded Electrical equipment should be regularly tested for safety Rooms should be well ventilated to prevent overheating Equipment turned off when nobody is in attendance Computers should be kept away from heat Air conditioning should be used TERM 55

Risk of Electrocution & Proximity to

Water

DEFINITION 55 Electrical equipment which has not been safety tested can lead to electrocution if parts become faulty If somebody trips over a trailing wire and it exposes the copper cables then that could also cause electrocution Water that is split onto electric equipment will not only damage the equipment but could also cause an electric shock Proximity to Water Equipment near water can be damaged, catch fire or electrocute Electric sockets near pipe joints could get wet due to leaks