Question: this is about cyber crime ( a ) ( i ) Consider the scenario of student examination results that have been marked, but not yet

this is about cyber crime
(a)
(i) Consider the scenario of student examination results that have been marked, but not yet
released to students. What are the two biggest security core principles of concern for
securing the students' results, and why?
26%
(ii) Outline any 8 ways organisations can act to protect themselves against cyber threats
targeting people within the organisation.
24%
(b)
(i) Alice has a Laptop as a Server Computer and Jerry has an Android Phone. Assume that
Alice and Jerry wish to exchange communications over the internet network using their
personally owned devices. What internet-based communications protocol can help their
devices to reliably connect?
10%
(ii) Using a suitable diagram, briefly describe how the communications protocol in 1(b)(i.) can
be used to establish a connection between Alice's server computer and Jerry's Android
phone over a computing/internet network.
40%
(a)
(i) What are the 3 offences introduced by the Computer Misuse Act (1990) to deal with
cases of inappropriate use of computers? Explain the meaning of each offence, along
with the prescribed punishment for violation.
27%
(ii) Outline the key principles of the General Data Protection Regulation (GDPR). Briefly
explain each principle.
23%
(b)
(i) The advent of the internet means that the amount of data available about individuals
continues to grow significantly, and governments globally want to be able to access and
retain these data, especially those that relate to the activities of their citizens. Briefly
explain with an example, any 3 reasons why governments want access to the data about
their citizens.
[15%]
(ii) Which cyber law is concerned with the regulation of surveillance and investigation by
public bodies? Identify any 3 technology developments that the law covered, and the
capacities it enabled.
 this is about cyber crime (a) (i) Consider the scenario of

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!