- Intellectual property: Rights surrounding the use of someone else's creative and intellectual property.
- Copyright: Includes songs, videos, software and documents all which are protected by copyright.
- Fair use doctrine: Involves cases where you can use someone else's material without concern to copyright.
- Pirated software: The use, duplication, distribution or sale of copyrighted software without authorisation.
- Counterfeit software: When fake software that is manufactured is sold.
Image from: http://www.contrib.andrew.cmu.edu/~elsaw/
2. Describe the relationship between an ‘email privacy policy’ and an ‘Internet use policy’.
- Email privacy policy: How an email system can be used by employees which also outlines to what extent an organisation can read their employees emails.
- Internet use policy: Guidelines that outline the use of the Internet with a certain organisation. E.g. not looking at inappropriate sites.
3. Summarise the five steps to creating an information security plan
- Develop information security policies: Includes things such as never sharing passwords, and changing passwords every 60 days.
- Communicate information security policies: Train employees and outline employee expectation.
- Identify critical information assets and risks: Ensure the use of user ID's, passwords, antivirus software and firewalls.
- Test and re-evaluate risks: Audit and review security plans periodically.
- Obtain stakeholder support: Endure top level management and stakeholders are aware of security policies and support them.
4. What do the terms; authentication and authorization mean, how do they differ, provide some examples of each term.
- Authentication: Used to confirm the identity of users. E.g. User ID, passwords or fingerprints.
- Authorisation: When someone is given consent do perform or have something.
5. What the Five main types of Security Risks, suggest one method to prevent the severity of risk?
No comments:
Post a Comment