Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

( a ) ( i ) Consider the scenario of student examination results that have been marked, but not yet released to students. What are

(a)
(i) Consider the scenario of student examination results that have been marked, but not yet
released to students. What are the two biggest security core principles of concern for
securing the students' results, and why?
26%
(ii) Outline any 8 ways organisations can act to protect themselves against cyber threats
targeting people within the organisation.
24%
(b)
(i) Alice has a Laptop as a Server Computer and Jerry has an Android Phone. Assume that
Alice and Jerry wish to exchange communications over the internet network using their
personally owned devices. What internet-based communications protocol can help their
devices to reliably connect?
10%
(ii) Using a suitable diagram, briefly describe how the communications protocol in 1(b)(i.) can
be used to establish a connection between Alice's server computer and Jerry's Android
phone over a computing/internet network.
40%
(a)
(i) What are the 3 offences introduced by the Computer Misuse Act (1990) to deal with
cases of inappropriate use of computers? Explain the meaning of each offence, along
with the prescribed punishment for violation.
27%
(ii) Outline the key principles of the General Data Protection Regulation (GDPR). Briefly
explain each principle.
23%
(b)
(i) The advent of the internet means that the amount of data available about individuals
continues to grow significantly, and governments globally want to be able to access and
retain these data, especially those that relate to the activities of their citizens. Briefly
explain with an example, any 3 reasons why governments want access to the data about
their citizens.
[15%]
(ii) Which cyber law is concerned with the regulation of surveillance and investigation by
public bodies? Identify any 3 technology developments that the law covered, and the
capacities it enabled.
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Databases Illuminated

Authors: Catherine Ricardo

2nd Edition

1449606008, 978-1449606008

More Books

Students also viewed these Databases questions

Question

Explain the various ways to protect employees.

Answered: 1 week ago