Describe and identify the implications for individuals and businesses of the Computer Misuse Act 1990:
unauthorised access to computer material
unauthorised access with intent to commit a further offence
unauthorised modification of programs or data on a computer
Describe and identify the security risks of:
tracking cookies
DOS (Denial of Service) attacks:
symptoms (slow performance, inability to access)
effects (disruption to users and businesses)
costs (lost revenue, labour in rectifying fault)
type of fault (bandwidth consumption, resource starvation, Domain Name Service (DNS) )
reasons (financial, political, personal)
Describe how encryption is used to secure transmission of data:
use of public and private keys
digital certificates
digital signatures
This topic will cover the laws, security risks and precautions around the use of Computer Systems