50 questions
What are the risks to a user of using websites that are not secure?
You can get hacked
Identity theft
Payment details stolen
Virus
How can websites be made more secure?
Use HTTPs
Password
Log In
Use Chrome
Give an example of an accessibility feature that can be used on a website
Make the text easier to read
Make font size adjustable
Use bold font
Underline key words
How can you protect against loss of data by employees?
Have a recycle bin
File permissions, so they are read only.
Password on files
Put up notices
What is a benefit of employees working at home?
Reduced working space required by companies
Workers can spend more time with their families
Workers will be distracted and may not get work done.
Can employ a wide range of workers, from a large geographical area.
What are internal threats to companies?
Someone employed may accidentally give out confidential details.
A hacker sneaking in to the building.
An employee taking information for their own use or to give to others.
A DDOS attack
What is a benefit of biometrics?
Unique, hard to replicate
Cheap to install
Always 100% accurate
Better than a password
What is a benefit of a white hat hacker
You will acting within the law.
They are cheap
Easier than a firewall
Faster than a black hat hacker
what is a white hat hacker?
Some one who illegally gets access to computer material
Some one who is paid to hack companies
Someone who gets on your computer but doesn't do anything
umm?
Which one of these breaks offense 3
white hat hacker
black hat hacker
grey hat hacker
what is a black hat hacker?
Some one who illegally gets access to computer material
Some one who is paid to hack companies
Someone who gets on your computer but doesn't do anything
umm?
what is a grey hat hacker?
Some one who illegally gets access to computer material
Some one who is paid to hack companies
Someone who gets on your computer but doesn't do anything
umm?
An important aspect of collaboration is the ability to work _____.
online
together
google apps
creatively
Computer programs which damage files and data spreads when infected programs are copied.
Viruses
Macro Virus
Worms
Trojan Horse
Malicious software which replicates itself and spreads between computer systems and over networks.
Viruses
Macro Virus
Worms
Trojan Horse
Also called cracking, refers to gaining unauthorized access to computer systems
Encrypting
Zombie Attack
Hacking
Identity Theft
These symbols tells you the trademark is protected by a federal registration
Copyright
Creative Commons
Trademark
Patent
Laws protecting intellectual property from unauthorized copying.
Licensing
Patent
Trademarks
Copyright
Creations of the mind, such as stories, films, music and computer programs
Software
Private Property
Intellectual Property
Systems Management
Software which restricts the actions a user can perform with a file, such as copying or printing. Also known as DRM
Digital Removal Management
Digital Reader Maintenance
Digital Rights Management
Copyright
Trademark
Copyleft
Patent
What year did the Computer Misuse Act come into force?
1990
1995
1980
1985
Select all of the examples of physical security measures.
Using a Firewall
RFID tags / badges so that staff can scan doors to open them
Use of antivirus software
Locking doors to protect equipment
Putting bars on windows or using strengthened glass
One of our learners contacts us and asks to have a copy of her records. Is it ok for us to ask for an administration fee of £10 to provide this?
Yes
Yes, as long as the fee is only nominal
No, you may no longer charge under GDPR
_ focuses on how a disabled person accesses or benefits from a site, system or application
Accessibility
Usability
Layout
Adaptability