Understand security threats and the legal requirements affecting system security.
Current security threats and techniques (which are continually evolving), including: internal threats, external threats, physical threats, social engineering and software-driven threats, techniques used to obtain secure information (software that has a malicious intent).
Network-based threats: passive threats, including wiretapping, port scanning and idle scanning.
Active threats, including denial-of-service attack, spoofing, man in the middle, Address Resolution Protocol (ARP) poisoning, smurf attack, buffer overflow, heap overflow, format string attack, Structured Query Language (SQL) injection and cyber attack.
Cloud computing security risks.
Data security risks: principles of confidentiality, integrity and availability of information, unauthorised access or modification of information, deliberate or accidental loss of information, the need to protect intellectual property from theft or malicious damage.
Legal requirements: data protection legislation and the requirements it places on organisations to keep data about stakeholders secure.
Computer misuse legislation and its definitions of illegal practices and applications.
Copyright, designs and patents legislation and its requirements in terms of protecting software products and digital media such as music and films.
Telecommunications (Lawful Business Practice) (Interception of Communications) regulations and their requirement to allow companies to monitor employee communication using systems and other uses of the internet while at work.
Fraud legislation, legal liability and contractual obligations.
System security breach is likely to result in one or more of the following: operational impact on an organisation of the loss of data or service, financial impact of loss of service, such as an e-commerce website damage to reputation, legal consequences of data privacy breaches, forensics research requirements to identify data lost, stolen or copied.
Assessment Criteria
-
1.1
Explain different system security threats and their potential impact on organisations.
-
1.2
Explain the principles of data security and the legal requirements organisations must adhere to.