ICT - Unit 1 LO5 - Personalised Learning Checklist

Page 1

Student Name: ___________ Grade Awarded by: __n/a__ Date Awarded: _____n/a___ Grade: PASS/MERIT/DISTINCTION

OCR Cambridge TEC (Introductory Diploma) in IT Spec 2016

Unit 1 – Fundamentals of

IT (Exam unit)

LO5 : UNDERSTAND ETHICAL, OPERATIONAL ISSUES and THREATS TO COMPUTER SYSTEMS

Unit 01 LO5 – Personalised Learning Checklist Note : L05 has a weighting of 10-20%. To save time, each student in a class pick a topic to complete the activity and collaborate eg. Using OneNote or GoogleDoc or GroupChat or GroupOneDrive via Office365 Outlook

topic

ACTIVITIES

Secure?

Produce a MINDMAP/TABLE that IDENTIFIES the ETHICAL ISSUES in IT What do Ethical issues mean?

Whistle blowing

5.1 ETHICAL ISSUES Codes of Practice

Staying Safe online

Disability/Gender/S exual discrimination

Bias

Use of Information

How to address each ethical issues?

Produce a TABLE that IDENTIFIES the OPERATIONAL ISSUES in IT2

5.2 OPERATIONAL ISSUES

Security of Information

Health and Safety

Disaster planning and recovery

Organisational policies Scale of change : drivers (change in business practice, (acceptable use policy, code of legislation, competition) conduct, etc) Produce a MINDMAP that IDENTIFIES THREATs to COMPUTER SYSTEMS LO2 t

5.3 THREATS to COMPUTER SYSTEMS

PHISHING DATA THEFT

HACKING

VIRUS

TROJAN

SOCIAL ENGINEERING

Change management Scale of change : needs (eg. Improved networking, remote access for employees, etc)

INTERCEPTION

EAVESDROPPING

HOW TO AVOID THREATS TO COMPUTER SYSTEMS

Produce a MINDMAP that identifies different PHYSICAL SECURITY methods and the CHARACTERISTICs. 5.4 PHYSICAL SECURITY

LOCKS BIOMETRICS RFID (Radio Frequency Identification) TOKENs PRIVATE SCREENS SHREDDING Characteristics of each Physical Security Use of each Physical Security methods in different context with JUSTIFICATIONs of using each Physical Security method in REASONS various context. Produce a MINDMAP that identifies DIGITAL SECURITY ANTIUSERNAME/ Characteristics of ANTI-VIRUS FIREWALLS PERMISSIONS ENCRYPTION SPYWARE PASSWORDS each Use of each Digital Security methods in different context with JUSTIFICATIONs of using each Digital Security method in REASONS various context.

5.5 DIGITAL SECURITY 5.6 SAFE DISPOSAL OF DATA and COMPUTER EQUIPMENT

Produce a MINDMAP that identifies SAFE DISPOSAL of DATA and COMPUTER EQUIPMENT Legislation*

OVERWRITE DATA

ELECTROMAGNETIC WIPE

KEY Skills for Technical jobs

*Legislation of Safe Disposal of Data and Computer Equipment: o o o o o o

WEEE : EU Waste Electrical and Electronics Equipment Directive Data Protection Act 1998 Environmental Protection Act 1990 The Hazardous Waste Directive 2005 Landfill Regulation 2002 Freedom of Information Act 2000

Source : http://www.it-trading.co.uk/content/legal_obligations.htm

PHYSICAL DESTRUCTION KEY Skills for Non-Technical jobs


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.