heating system
intelligent systems
Describe the environmental impact of intelligent systems on heating systems.
traffic control
intelligent systems
Describe the environmental impact of intelligent systems on traffic control.
car management systems
intelligent systems
Describe the environmental impact of intelligent systems on car management systems.
computer misuse act
Describe and identify the implications for individuals and businesses of the Computer Misuse Act 1990.
unauthorised access
computer misuse act
Describe the meaning of unauthorised access to computer material under the Computer Misuse Act 1990.
intent to commit further offence
computer misuse act
Describe the meaning of unauthorised access with intent to commit a further offence under the Computer Misuse Act 1990.
unauthorised modification
computer misuse act
Describe the meaning of unauthorised modification of programs or data on a computer under the Computer Misuse Act 1990.
tracking cookie
security risk
Describe and identify the security risks of tracking cookies.
DOS symptom
slow performance, inability to access service
Describe and identify Denial of Service attack symptoms: slow performance, inability to access.
DOS effects
service disruption to business, service disruption to users
Describe and identify Denial of Service attack effects: disruption to users and businesses.
DOS costs
lost revenue, fault maintenance cost
Describe and identify Denial of Service attack costs: lost revenue, labour in rectifying faults.
DOS fault type
bandwidth consumption, resource starvation, Domain Name Service
Describe and identify Denial of Service attack fault types: bandwidth consumption, resource starvation, Domain Name Service (DNS)
DOS attack motivation, reason
financial, political, personal
Describe and identify Denial of Service attack reasons: financial, political, personal
encryption
private key, public key
Describe use of public and private keys for encryption to provide secure data transmission.
digital certificate
certificate authority
Describe use of digital certificates for encryption to provide secure data transmission.
digital signature
Describe use of digital signatures for encryption to provide secure data transmission.