Student Name: ___________ Grade Awarded by: __n/a__ Date Awarded: _____n/a___ Grade: PASS/MERIT/DISTINCTION
OCR Cambridge TEC (Introductory Diploma) in IT Spec 2016
Unit 1 – Fundamentals of
IT (Exam unit)
LO5 : UNDERSTAND ETHICAL, OPERATIONAL ISSUES and THREATS TO COMPUTER SYSTEMS
Unit 01 LO5 – Personalised Learning Checklist Note : L05 has a weighting of 10-20%. To save time, each student in a class pick a topic to complete the activity and collaborate eg. Using OneNote or GoogleDoc or GroupChat or GroupOneDrive via Office365 Outlook
topic
ACTIVITIES
Secure?
Produce a MINDMAP/TABLE that IDENTIFIES the ETHICAL ISSUES in IT What do Ethical issues mean?
Whistle blowing
5.1 ETHICAL ISSUES Codes of Practice
Staying Safe online
Disability/Gender/S exual discrimination
Bias
Use of Information
How to address each ethical issues?
Produce a TABLE that IDENTIFIES the OPERATIONAL ISSUES in IT2
5.2 OPERATIONAL ISSUES
Security of Information
Health and Safety
Disaster planning and recovery
Organisational policies Scale of change : drivers (change in business practice, (acceptable use policy, code of legislation, competition) conduct, etc) Produce a MINDMAP that IDENTIFIES THREATs to COMPUTER SYSTEMS LO2 t
5.3 THREATS to COMPUTER SYSTEMS
PHISHING DATA THEFT
HACKING
VIRUS
TROJAN
SOCIAL ENGINEERING
Change management Scale of change : needs (eg. Improved networking, remote access for employees, etc)
INTERCEPTION
EAVESDROPPING
HOW TO AVOID THREATS TO COMPUTER SYSTEMS
Produce a MINDMAP that identifies different PHYSICAL SECURITY methods and the CHARACTERISTICs. 5.4 PHYSICAL SECURITY
LOCKS BIOMETRICS RFID (Radio Frequency Identification) TOKENs PRIVATE SCREENS SHREDDING Characteristics of each Physical Security Use of each Physical Security methods in different context with JUSTIFICATIONs of using each Physical Security method in REASONS various context. Produce a MINDMAP that identifies DIGITAL SECURITY ANTIUSERNAME/ Characteristics of ANTI-VIRUS FIREWALLS PERMISSIONS ENCRYPTION SPYWARE PASSWORDS each Use of each Digital Security methods in different context with JUSTIFICATIONs of using each Digital Security method in REASONS various context.
5.5 DIGITAL SECURITY 5.6 SAFE DISPOSAL OF DATA and COMPUTER EQUIPMENT
Produce a MINDMAP that identifies SAFE DISPOSAL of DATA and COMPUTER EQUIPMENT Legislation*
OVERWRITE DATA
ELECTROMAGNETIC WIPE
KEY Skills for Technical jobs
*Legislation of Safe Disposal of Data and Computer Equipment: o o o o o o
WEEE : EU Waste Electrical and Electronics Equipment Directive Data Protection Act 1998 Environmental Protection Act 1990 The Hazardous Waste Directive 2005 Landfill Regulation 2002 Freedom of Information Act 2000
Source : http://www.it-trading.co.uk/content/legal_obligations.htm
PHYSICAL DESTRUCTION KEY Skills for Non-Technical jobs