Thursday 8 November 2007

10.8 Important Points

Most 10.8 exam questions are written in two ways:
  • Provide a definition of Computer Crime and Malpractice
  • Provide weak points and ways to reduce weak points in an IT system

So it is important to learn the 2 definitions and the 2 lists on the previous post.

3 comments:

Alastair Barker said...

1. Mrs Jones has bought a book on gardening from a book company on the World Wide Web. She has now started to receive e-mails about garden furniture, and plant catalogues through the post.

(a) Explain why Mrs Jones has started to receive the e-mails and the catalogues.
(2 marks)

(b) Some people are worried about ordering goods using credit cards over the Internet. Explain what can be done by the book company to prevent credit card details being misused.
(2 marks)

Alastair Barker said...

2. The use of laptop computers by company employees has increased the threats
to ICT systems. Describe four threats to ICT systems caused by employees using laptops.

Alastair Barker said...

3. Information Systems need to be protected from both internal and external threats.

(a) Explain, using examples, the differences between an internal and an external threat to an Information System. 4 marks

(b) For each of the following, describe a measure that a company can take to protect his or her Information System from:
(i) Internal threats; 2 marks
(ii) External threats. 2 marks