3.2 Describe ethical and unethical conduct in relation to cybersecurity.

  
🔴 LIVE EXPERT
  136 Orders

Cybersecurity 

NOTE: Kindly share your UPDATED exam paper to the LIVE EXPERT with an updated Case Study (if any)

Unit Number

Y/618/3631

Level

Level 1

Credit Value

6

GLH

48

Unit Aim

Learners will learn about cybercrime and the risks and effects it has on individuals and organisations. They will understand routine protective methods used to maintain cybersecurity including the principles of vulnerability and penetration testing and user access control.

Assessment Guidance

N/A

Grading Guidance

N/A


This unit has 3 learning outcomes.

 LEARNING OUTCOMES

 ASSESSMENT CRITERA

 The Learner will:

 The Learner can:

 1. Know about cybercrime.

  • Identify different forms of cybercrime and possible motives.
  • Outline how cybercrime can affect individuals and organisations
  • Describe the tactics cybercriminals use to defraud

AC 1.3:
  • Social engineering: relies on human instinct of trust, carefully worded email, voicemail, or text message from a cybercriminal can convince people to transfer money, provide confidential information, or download a file that installs malware.

2. Know about protective methods to maintain cybersecurity.

  • Identify routine importance of cybersecurity testing.
  • State the importance of cybersecurity testing.
  • Set up user access controls.
 

AC 2.1:

  • Protective methods: practicing diligence, installing appropriate anti-virus software, installing other appropriate security software, turning on firewall, protecting personal information, browser safety, client software, frequent and regular updating, care with email attachments, not opening pop ups, avoiding emails from unknown sources, not visiting suspect sites, anti-malware software, use and protection of passwords, data protection (personal/financial information), restricting access, regular backups.


AC 2.2:

  • Cyber security testing: measures the effectiveness of security measures against a potential attack, can be manual or automated, vulnerability testing to reduce the possibility for intruders (hackers) to get unauthorised access, penetration testing (ethical hacking).
  • Purpose: to test an IT system, network or web application to find security vulnerabilities that a cybercriminal could exploit.


AC 2.3:

  • User access controls: learners could do this by setting up user access control on a network or operating system. For example, a cloud based application could be used to set up shared folders; learners could set various permissions, including some with restricted access.
3. Know about legislation and codes of conduct related to cybersecurity.
  • Identify protections for and responsibilities of individuals and organisations as set out in key legislation.
  • Describe ethical and unethical conduct in relation to cybersecurity.
 

AC 3.1:

  • Current UK legislation that applies to different IT systems and data.
  • The principles and requirements of the data protection legislation (The Data Protection Act, 2018, GDPR) and its impact on organisations, IT systems and data.
  • Computer Misuse Act 1990, its definitions of illegal practices and the impact it has on organisations, IT systems and data.
  • Other legislation could include: Official Secrets Act 1989, The Privacy and Electronic Communications Regulations 2003.


AC 3.2:

  • Ethical conduct could include: adherence to organisational IT policies and procedures, maintaining confidentiality, adherence to applicable laws, promoting information security, refraining from conflicts of interest.
  • Unethical conduct could include: sabotage, disclosing or misusing confidential information, maliciously injuring the reputation or prospects of an individual or organisation.

The quoted price covers up to 3000 words. For custom requirements Live Chat or Whatsapp Click Here



                             

Email: care@academiasupport.co.uk

100% Plagiarism Free & Custom Written, Tailored to your instructions