Cambridge Technicals: IT

Slides:



Advertisements
Similar presentations
 Ethics (relating to ICT) are about the: › Sensible › Legal › Moral uses of ICT.  They are designed to develop and make best use of technology.
Advertisements

Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
Fair Treatment in the Workplace. Introduction Each day, workers from around the world head to their respective jobs in order to complete the tasks required.
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Chapter 16 Security. 2 Chapter 16 - Objectives u The scope of database security. u Why database security is a serious concern for an organization. u The.
ICAICT202A - Work and communicate effectively in an IT environment
Understand your role 1 Standard.
Module 6: The impact of national policy and legislation
Generic skills that enable our technical skills
Property of Common Sense Privacy - all rights reserved THE DATA PROTECTION ACT 1998 A QUESTION OF PRINCIPLES Sheelagh F M.
Human Resources. To understand what are meant by effective communication and feedback Analyse the advantages and disadvantages of different communication.
Telecommuting Teleworking Video-Conferencing Codes of Conduct
Data Protection Paul Veysey & Bethan Walsh. Introduction Data Protection is about protecting people by responsibly managing their data in ways they expect.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
CENTRAL SCOTLAND POLICE Data Protection & Information Security Stuart Macfarlane Information Governance Unit Police Service of Scotland.
PART THREE E-commerce in Action Norton University E-commerce in Action.
HIPAA PRIVACY AND SECURITY AWARENESS.
RIGHTS AND RESPONSIBILITIES
DEVELOPING A RISK ANALYSIS. What is a risk analysis? A Risk analysis is concerned with identifying the risks that an organisation is exposed to, identifying.
00870B2F.0/Internet%20Safety.jpg.
© 2012 Cengage Learning. All Rights Reserved. May not be scanned, copied, duplicated, or posted to a publicly accessible website, in whole or in part.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
INTERNET SAFETY.
1 Chapter 3: Business Ethics and Social Responsibility Business Ethics What Role Should Ethics Play in Business? Business ethics are based on society’s.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Level 2 Hospitality and Catering Principles (Food and Beverage) Day 8: Unit 24 - Principles of Customer Service in Hospitality, Leisure, Travel and Tourism.
Security and Ethics Safeguards and Codes of Conduct.
? Moral principles of right and wrong Used by individuals/organisations To guide behaviour.
Computing, Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Computing, Ethics and The Law
Operational Issues. Operational Changes It is important to organisations to ensure that they abide by the Law when caring for the safety of their employees,
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
A properly constructed virus can disrupt productivity causing billions of dollars in damage A virus is a small piece of software that piggybacks on real.
Welcome to the ICT Department Unit 3_5 Security Policies.
Moral, Ethical, legal and cultural issues How technical innovation leads to moral, ethical, legal and cultural issues How our own moral and ethical beliefs.
Information Security and Privacy in HRIS
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
8 – Protecting Data and Security
Rights and responsibilities of providers and individuals
Chapter 13: The IT Professional
Instructor Materials Chapter 13: The IT Professional
Ethics & Social Responsibility
Jeopardy—CH 8 Security Risks Ethics- Health Emerging Technology
Chapter 17 Risks, Security and Disaster Recovery
Ethics & Social Responsibility
Unit 7 – Organisational Systems Security
Internet Safety and Acceptable Use Policies.
Business Contingency Planning
IT INFRASTRUCTURES Business-Driven Technologies
Spencer County Public Schools Responsible Use Policy for Technology and Related Devices Spencer County Public Schools has access to and use of the Internet.
D3 Confidentiality.
Information management and communication
LO2 - Be Able to Design IT Systems to Meet Business Needs
OBSERVE ETHICAL PRACTICES
Unit# 5: Internet and Worldwide Web
Ethics and Social Responsibility
What Would You Do? Ethics in Travel and Tourism Management.
Handout 9: Organisational policies and procedures
Unit 1 Fundamentals of IT
4 Chapter Business Ethics and Social Responsibility pp
Protecting Data and Information
Unit 1 Fundamentals of IT
Chapter 13: The IT Professional
LO5 Unit 1: Fundamentals of IT
Unit 1 Fundamentals of IT
Presentation transcript:

Cambridge Technicals: IT Unit 1: fundamentals of it LO5 – Understand ethical and operational issues and threats to computer systems

Assessment Outcomes You will need to understand: 5.1 Ethical issues 5.2 Operational issues 5.3 Threats 5.4 Physical security 5.5 Digital security 5.6 Safe disposal of data and computer equipment You will need to understand: Communication skills used in the IT environment Use of different communication technologies Personal attributes and being ready for work Job roles in IT and the skills required Professional bodies and Industry certification In the exam you will be given precise questions requiring precise answers based on a scenario to answers questions from, and adapt your knowledge and use the key terms and named components to give a judgemental answer

Ethical issues – whistle blowing Whistle blowing is when an employee discloses that some form of serious unlawful practice is taking place within their place of work. The unlawful activity could include miscarriages of justice, illegal activity, threats to individuals and damage to the environment. Whistle blowers are protected by UK law against any form of ‘punishment’ by their organisation, e.g. Unfair dismissal, not being promoted Edward Snowden Leaked information about NSA Surveillance, one of the most significant leaks in US political history Julian Assange Founder of Wikileaks, publishes secret information from anonymous sources, notably the CIA

Ethical issues – discrimination Behaving ethically can be underwritten by law. The Equality Act (2010) ensures equality of treatment for all people, irrespective of colour, race, disability or gender. Examples of discrimination include people not receiving equal pay for the doing the same job because of gender, disability and sexuality. Male and female warehouse employees found to be paid differently in 2003 Female workers at Ford’s Dagenham plant fought for equal pay in the 1960s BBC Presenters found to have wildly differing levels of pay, leading to some male broadcasters volunteering pay-cuts

Ethical issues – use of information The Data Protection Act (1998) ensures that personal data is used responsibly. When designing or developing or using information systems, ethical considerations should be made with respect to how the information is collected, processed, stored, used and distributed.

Ethical issues – codes of practice Most workplaces will have use a Code of Practice to provide ethical guidance, such as confidentiality with clients. There are Codes of Practice to cover how you behave, quality assurance of products and services, equality and discrimination.

Ethical issues – staying safe online There are guides on staying safe online to avoid problems with individuals who do not behave ethically or have a different ethical code from those of society as a whole

Operational issues 5.2 Operational issues Security of Information Failure to protect information from loss, corruption, illegal duplication, or being stolen, manipulated or hacked can provoke poor publicity. This can result in loss of business, bankruptcy or even fines and court cases. Loss of production information and sales data can leave a business unable to meet its requirements. In 2014, Yahoo were a victim of a data breach of that compromised personal information of 500 million users – knocking an estimated $350M off its sale price to Verizon

Operational issues 5.2 Operational issues Health & Safety Failure to protect employees and clients or visitors can reflect badly on the organisation if reported in the press. It can also result in large compensation claims, court cases, fines or even imprisonment in the most serious cases, such as loss of life. There is also an ethical or moral issue, as risking the lives and health of employees through a careless attitude to their safety is not acceptable behaviour.

Operational issues 5.2 Operational issues Disaster and Recovery planning Organisations take note of all the issues that could risk their assets, employees and existence. They will produce a plan to either reduce risk to the lowest possible level or provide alternative facilities or locations. Backing up data as often as necessary will ensure that minimal data is lost if there is a computer failure. Placing copies of the backup data in different physical locations in case of fire, flood or earthquake is also a possible disaster plan.

Operational issues 5.2 Operational issues Organisational policies Organisations have policies to establish the rules for acceptable behaviour and guidelines for best practice in certain work-related situations. An acceptable use policy stipulates what a person can and cannot do when using the network and the internet while at work. The majority of educational establishments will require their learners to sign an acceptable use policy before they will issue them with a network ID. A code of conduct policy sets out the standards of behaviour expected from employees while working the premises or the premises of their clients.

Operational issues 5.2 Operational issues Change drivers These are things which must change, such as new legislation, new entrants into the market, an increase in the number of platforms that can share, distribute, license or sell music, or new business practices. Scale of Change This reflects the changing needs of the business, by upgrading systems and policies to best suit what is required as a business grows or evolves. This could include replacing a slow network with a faster optical fibre system, introducing an extranet, allowing customers to log into some systems externally, providing remote access for employees to access work from home.

Pass grade questions 5.2 Operational issues Define the following terms: Whistle blower Code of practice Discrimination Code of conduct policy Acceptable use policy Disaster recovery plan With the introduction of a new computer network, the IT consultant has suggested that a network manager should be appointed. As an IT technician, you feel that this is an opportunity for you to obtain a promotion. Explain the personal attributes that are required for both roles and what evidence you could provide of current attributes. [3] Outline the additional personal attributes required by the new network manager. [3] Explain why Grab and Go should undertake a disaster planning and recovery event to protect its data. [4]

Exam questions 5.2 Operational issues Grab and Go is a fast food outlet with six branches across the Northwest of England. This growth has taken place over the past three years and each branch has its own computer network which links via email to the others. All sales and financial records are sent weekly via email to the head office, which is the site of the original outlet. The owner has decided that the organisation needs a network that will link the shops electronically and enable all data relating to the business to be stored centrally on a server at head office. You have been asked to work with a local IT consultant to design the new system. With the introduction of a new computer network, the IT consultant has suggested that a network manager should be appointed. As an IT technician, you feel that this is an opportunity for you to obtain a promotion. Explain the personal attributes that are required for both roles and what evidence you could provide of current attributes. [3] Outline the additional personal attributes required by the new network manager. [3] Explain why Grab and Go should undertake a disaster planning and recovery event to protect its data. [4]

threats 5.3 Threats Phishing Misleading individuals or organisations into parting with their confidential and personal data to commit fraud. Hacking Not all hacking is external, as employees also hack their own company systems. This includes looking at files or locations to which they do not have right of access; creating, modifying or deleting files without permission; or defacing web pages. Trojan (horse) Introducing a piece of code which, when certain conditions are met, will carry out an action which will be detrimental to the system (like wiping data, or damaging files) Interception When the data packets on the internet are intercepted by a third party and copied, edited or transferred to a new location. Eavesdropping Listening to communication traffic not intended for the reader or listener such as email, instant messaging, faxing or video-conferencing.