10.8 Information Systems Malpractice and Crime

Specification Content/Learning Outcomes

Information Systems Malpractice & Crime looks at the types of data theft that occur and methods of trying to prevent them.
  • Explain the consequences of malpractice and crime on information systems.
     
  • Describe the possible weak points within an information technology systems.
     
  • Describe the measures that can be taken to protect information technology systems against internal and external threats.
     
  • Describe the particular issues surrounding access to, and the use of the Internet; censorship, security, ethics

Resources - Information Systems Malpractice and Crime

Key to resources: PowerPoint presentation Word file Acrobat file
  Internet resource        

 

Resource

Type

Size

Notes
Malpractice and Crime

n/a Alcester Grammar School links covering this topic
Computer Crime Prevention

n/a Interesting and readable article from the Royal Canadian Mounted Police.
Computer Crime & Security

43kb Notes from David Yates.
Computer Crime

n/a Useful facts, figures and definitions.
Malpractice and Crime

n/a Greenwood School resources. Scroll down to the links in 10.8.
Computer Crime2

154Kb Short PowerPoint presentation based on Heathcote Ch. 10.
Computer Crime3

71Kb PowerPoint presentation from Billericay School.
Computer Security

n/a EverythingICT links covering this topic
Protecting Data

55Kb PowerPoint presentation from Billericay School.

Add/suggest new resources - Click here to suggest new resources relevant to this topic. Do NOT add attachments e.g. Word documents to your suggestions as these will be discarded.

Reading - Information Systems Malpractice and Crime

Texts other than Heathcote can be found in the ICT section of the Library Resource Centre.

Key to reading: Heathcote - Core Text Internet resource Other book
  Handout/worksheet        

 

Reading

Type

Size

Notes
Computer Crime and the Law

n/a Heathcote Ch.10 Pages 44 - 49
Protecting IT Systems

n/a Heathcote Ch.11 Pages 50 - 53
Computer Security

n/a De Watteville & Naughton Pages 179 - 182
Obligations of System Users

n/a De Watteville & Naughton Page 178
Malpractice and Crime

n/a Steve Longley's excellent notes. Allow each page to load fully.
Revision Checklist

39kb Detailed checklist from Alcester Grammar School
Legal and Security Aspects

n/a Doyle Ch.14 Pages 210 - 225
Computer Crime

n/a Online chapter from "Computer Crime: A Crimefighter's Handbook"

Practice questions/homework - Malpractice and Crime

Key to questions: Past exam question Heathcote question

Other question
  FatMax assignment Smokin' Dog assignment

 

Reference

Type

Size

Question

1. January 2002 ICT1 Question 5


 

n/a Information Systems need to be protected from both internal and external threats

(a) Explain: using examples, the differences between an internal and an external threat to an Information System. (4 marks)

(b) For each of the following, describe a measure that a company can take to protect their Information System from:

(i) Internal threats; (2 marks)

(ii) External threats. (2 marks)
(8 marks)

2. January 2002 ICT1 Question 4

n/a Explain, using examples, four different ways in which the Internet is being used to support illegal activities.
(8 marks)
3. May 2001 ICT1 Question 11

n/a Explain, with reasons, two levels of access that could be given to different categories of users of an on-line stock control system
(4 marks)
4. Ten quick revision questions from Alcester Grammar School

n/a 1. Name three types of files that need to be protected in a computer system

2. Describe two types of damage that can be inflicted on files 

3. Give three statement that could appear in a code of practice given to staff who borrow laptop computers 

4. State one advantage and one disadvantage of short passwords 

5. What is meant by dictionary attack?

6. What is biometrics?

7. What do hackers do?

8. Describe three types of common computer virus? 

9. What is a 'denial of service' attack? 

10. What is a mail bomb?
5. January 2002 ICT1 Question 7

n/a A school wishes to allow its students unrestricted access to the Internet for research work during their lunchtimes. The headteacher is concerned that this might cause problems.

State two problems that the headteacher might be concerned about, and for each one explain a measure that could be taken to prevent the problem
(6 marks)

6. Homework questions from David Yates.

n/a 1. The Computer Misuse Act defines three types of offence.  With the aid of examples, describe each of these three types of offence
(9 marks)

2.  The illegal use of computer systems is sometimes known as computer-related crime.

(a )  Give three distinct examples of computer-related crime  (3)

(b)    Give three steps that can be taken to help prevent computer-related crime (3)
(6 marks)

3.  Describe three ways in which a person could gain unauthorised access to information stored on a computer
(6 marks)

7. Steve Longley's past paper database

n/a Past paper exam questions for this topic. Mark scheme included.

 

AS Modules ICT1 Links Top Home FatMax1

Copyright/Disclaimer - I think everyone whose work appears on this site has been properly attributed and credited. If not, get in touch and I'll make the necessary amendments. FatMax 2002.

Hosted by www.Geocities.ws

1