U
NIT
11:
C
YBER
S
ECURITY AND
I
NCIDENT
M
ANAGEMENT
Pearson BTEC International Level 3 Qualifications in Information Technology –
Specification – Issue 3 – September 2022 © Pearson Education Limited 2022
156
o
physical, including theft of equipment, Universal Serial Bus (USB) storage
devices with sensitive data, collection of passwords and other information by
social-engineering methods
o
process of how people use the system, including leaks and sharing security
details
o
security implications of cloud computing and of the Internet of Things (IoT)
devices.
•
Where to find up-to-date sources of information on specific known hardware
and software vulnerabilities.
•
Attack vectors, including: Wi-Fi, Bluetooth
®
, internet connection, internal
network access.
A3 Legal responsibilities
Apply an understanding of the legal responsibilities of organisations in a range of sector
and vocational-based scenarios with regards to cyber security.
•
International and regional legislation and regulations for data protection.
•
Computer misuse policy/act and amendments, its definitions of illegal practices
and applications.
•
Telecommunications legislation, requirements to
allow companies to monitor
an employee’s communication and internet use while at work.
•
Fraud policy legislation-requirements to deal with services using IT-based
methods to steal information for fraudulent purposes
•
International regulations dealing with health and safety at work and the rights
and
duties of employers, employees at work.
Dostları ilə paylaş: