10.8 Information Systems Malpractice and Crime
Specification Content/Learning Outcomes |
Information Systems Malpractice & Crime looks at the types of data theft that occur and methods of trying to prevent them.
|
Resources - Information Systems Malpractice and Crime
Key to resources: | PowerPoint presentation | Word file | Acrobat file | |||
Internet resource |
Resource |
Type |
Size |
Notes |
Malpractice and Crime | n/a | Alcester Grammar School links covering this topic | |
Computer Crime Prevention | n/a | Interesting and readable article from the Royal Canadian Mounted Police. | |
Computer Crime & Security | 43kb | Notes from David Yates. | |
Computer Crime | n/a | Useful facts, figures and definitions. | |
Malpractice and Crime | n/a | Greenwood School resources. Scroll down to the links in 10.8. | |
Computer Crime2 | 154Kb | Short PowerPoint presentation based on Heathcote Ch. 10. | |
Computer Crime3 | 71Kb | PowerPoint presentation from Billericay School. | |
Computer Security | n/a | EverythingICT links covering this topic | |
Protecting Data | 55Kb | PowerPoint presentation from Billericay School. |
Add/suggest new resources - Click here to suggest new resources relevant to this topic. Do NOT add attachments e.g. Word documents to your suggestions as these will be discarded.
Reading - Information Systems Malpractice
and Crime
Texts other than Heathcote can be found in the ICT section of the Library
Resource Centre.
Key to reading: | Heathcote - Core Text | Internet resource | Other book | |||
Handout/worksheet |
Reading |
Type |
Size |
Notes |
Computer Crime and the Law | n/a | Heathcote Ch.10 Pages 44 - 49 | |
Protecting IT Systems | n/a | Heathcote Ch.11 Pages 50 - 53 | |
Computer Security | n/a | De Watteville & Naughton Pages 179 - 182 | |
Obligations of System Users | n/a | De Watteville & Naughton Page 178 | |
Malpractice and Crime | n/a | Steve Longley's excellent notes. Allow each page to load fully. | |
Revision Checklist | 39kb | Detailed checklist from Alcester Grammar School | |
Legal and Security Aspects | n/a | Doyle Ch.14 Pages 210 - 225 | |
Computer Crime | n/a | Online chapter from "Computer Crime: A Crimefighter's Handbook" |
Practice questions/homework - Malpractice and Crime
Key to questions: | Past exam question | Heathcote question | Other question | |||
FatMax assignment | Smokin' Dog assignment |
Reference |
Type |
Size |
Question |
1. January 2002 ICT1 Question 5 |
|
n/a | Information Systems need to be
protected from both internal and external threats (a) Explain: using examples, the differences between an internal and an external threat to an Information System. (4 marks) (b) For each of the following, describe a measure that a company can take to protect their Information System from: (i) Internal threats; (2 marks) (ii) External threats. (2 marks) |
2. January 2002 ICT1 Question 4 | n/a | Explain, using examples, four
different ways in which the Internet is being used to support illegal
activities. (8 marks) |
|
3. May 2001 ICT1 Question 11 | n/a | Explain, with reasons, two
levels of access that could be given to different categories of users of an
on-line stock control system (4 marks) |
|
4. Ten quick revision questions from Alcester Grammar School | n/a | 1. Name three types of files
that need to be protected in a computer system 2. Describe two types of damage that can be inflicted on files 3. Give three statement that could appear in a code of practice given to staff who borrow laptop computers 4. State one advantage and one disadvantage of short passwords 5. What is meant by dictionary attack? 6. What is biometrics? 7. What do hackers do? 8. Describe three types of common computer virus? 9. What is a 'denial of service' attack? 10. What is a mail bomb? |
|
5. January 2002 ICT1 Question 7 | n/a | A school wishes to allow its
students unrestricted access to the Internet for research work during their
lunchtimes. The headteacher is concerned that this might cause problems.
State two problems that the headteacher might
be concerned about, and for each one explain a measure that could be taken
to prevent the problem |
|
6. Homework questions from David Yates. | n/a | 1. The Computer Misuse Act
defines three types of offence. With the aid of examples, describe each of
these three types of offence (9 marks) 2. The illegal use of computer systems is sometimes known as computer-related crime. (a ) Give three distinct examples of computer-related crime (3) (b) Give three steps that can be taken
to help prevent computer-related crime (3) 3. Describe three ways in which a person
could gain unauthorised access to information stored on a computer |
|
7. Steve Longley's past paper database | n/a | Past paper exam questions for this topic. Mark scheme included. |
AS Modules | ICT1 | Links | Top | Home | FatMax1 |
Copyright/Disclaimer - I think everyone whose work appears on this site has been properly attributed and credited. If not, get in touch and I'll make the necessary amendments. FatMax 2002.