.
Horse
Snake
Pig
Worm
True
False
Trojans
Fire
Animals
Abuse by Staff
Incorrect attire
Misspelling
True
False
Keyboard
Clothes
Mice
When an employee goes against the company ICT code of practice e.g leaving workstation logged on
When individuals or organisations break the law through using computers illegally access a computer system
A piece of malicious code that is written by programmers and is used to corrupt data and systems.
When an employee goes against the company ICT code of practice e.g leaving workstation logged on
A piece of malicious code that is written by programmers and is used to corrupt data and systems.
When individuals or organisations break the law through using computers illegally access a computer system
When individuals or organisations break the law through using computers illegally access a computer system
A piece of malicious code that is written by programmers and is used to corrupt data and systems.
When an employee goes against the company ICT code of practice e.g leaving workstation logged on
A mechanism that is designed to detect, prevent or recover from a security threat
A barrier between the internet and a private computer that blocks threats such as viruses
A service that enhances the security of the data-processing systems and the data transfers of an organisation
Data protection Act 1996
Data Protection Act 1998
Computer Misuse Act
Copyright, Designs and Patents Act 1988
Data protection Act 1996
Data Protection Act 1998
Computer Misuse Act
Copyright, Designs and Patents Act 1988
Copyright, Designs and Patents Act 1988
Data Protection Act 1998
Computer Misuse Act
Not taking backup copies
Logging off
Not turning the screen off after shutting down
Not turning off the computer
Not scanning for virus
Accidentally deleting data
True
False
True
False
Fraud
Theft of hardware
Giving log in details out
Destruction of data
Hacking
Viewing inappropriate material