Wednesday, 25 July 2018

EXERCISE

  • Explain Data Protection Act. Find an article which violates Data Protection Act
Data Protection Act is a law designed to protect personal data that stored on the systems. 


  • Explain Computer Misuse Act. Find an article which violates Computer  Misuse Act

The computer Misuse Act is designed to protect the computer users against the attackers that want to steal the user's information.



  • Research a range of physical security technologies including bio-metrics, swipe cards, theft prevention (security guard) etc. (5)
  1. Bio-metrics: devices measure unique characteristics of a person such as voice pattern or fingerprint patterns.
  2. Swipe cars: it is a door entry systems complete with swipe card door locks is the most common access system used by businesses today.
  3. Security guards: a person employed to protect a building against intruders or damage.
  4. CCTV: is a TV system in which signals are not publicly distributed but are monitored, primarily for surveillance and security purposes.
  5. Security Alarm: 
  • Research different ways that physical security could be breached.





  • What is ISO 31000 risk management?
It is a guidelines, provides principles, framework and a process for managing risk. It can be used by any organization regardless of its size, activity or sector. It can help organizations increase the likelihood of achieving objectives, improve the identification of opportunities and threats and effectively allocate and user resources for risk treatment.

Example of company that have ISO:




References:

ISO 31000 Risk management

Iso.org. (2018). ISO 31000 Risk management. [online] Available at: https://www.iso.org/iso-31000-risk-management.html [Accessed 26 Jul. 2018].