Describe the tactics cybercriminals use to defraud people.

  
🔴 LIVE EXPERT
  164 Orders

Cybersecurity 

NOTE: Kindly share your UPDATED exam paper to the LIVE EXPERT with an updated Case Study (if any)

Unit Number

Y/618/3631

Level

Level 1

Credit Value

6

GLH

48

Unit Aim

Learners will learn about cybercrime and the risks and effects it has on individuals and organisations. They will understand routine protective methods used to maintain cybersecurity including the principles of vulnerability and penetration testing and user access control.

Assessment Guidance

N/A

Grading Guidance

N/A

This unit has 3 learning outcomes.

 LEARNING OUTCOMES

 ASSESSMENT CRITERA

 The Learner will:

 The Learner can:

 1. Know about cybercrime.

  • Identify different forms of cybercrime and possible motives.
  • Outline how cybercrime can affect individuals and organisations
  • Describe the tactics cybercriminals use to defraud

Common forms of cybercrime and motives:

  • Phishing: using fake email messages to get personal information
  • Stealing/misusing personal information (identity theft)
  • Hacking: accessing, shutting down or misusing websites, networks and IT systems
  • Advocating terrorism-related acts
  • Email and internet fraud
  • Theft of financial or card payment data
  • Theft and sale of corporate data
  • Cyberextortion (demanding money to prevent a threatened attack)
  • Ransomware attacks
  • Denial-of-Service (DoS) attack
  • Cryptojacking (where hackers mine cryptocurrency using resources they do not own)
  • Cyberespionage (where hackers access government or company data)

2. Know about protective methods to maintain cybersecurity.

  • Identify routine importance of cybersecurity testing.
  • State the importance of cybersecurity testing.
  • Set up user access controls.
 

AC 2.1:

  • Protective methods: practicing diligence, installing appropriate anti-virus software, installing other appropriate security software, turning on firewall, protecting personal information, browser safety, client software, frequent and regular updating, care with email attachments, not opening pop ups, avoiding emails from unknown sources, not visiting suspect sites, anti-malware software, use and protection of passwords, data protection (personal/financial information), restricting access, regular backups.

AC 2.2:

  • Cyber security testing: measures the effectiveness of security measures against a potential attack, can be manual or automated, vulnerability testing to reduce the possibility for intruders (hackers) to get unauthorised access, penetration testing (ethical hacking).
  • Purpose: to test an IT system, network or web application to find security vulnerabilities that a cybercriminal could exploit.

AC 2.3:

  • User access controls: learners could do this by setting up user access control on a network or operating system. For example, a cloud based application could be used to set up shared folders; learners could set various permissions, including some with restricted access.
3. Know about legislation and codes of conduct related to cybersecurity.
  • Identify protections for and responsibilities of individuals and organisations as set out in key legislation.Describe ethical and unethical conduct in relation to cybersecurity.
 

AC 3.1:

  • Current UK legislation that applies to different IT systems and data.
  • The principles and requirements of the data protection legislation (The Data Protection Act, 2018, GDPR) and its impact on organisations, IT systems and data.
  • Computer Misuse Act 1990, its definitions of illegal practices and the impact it has on organisations, IT systems and data.
  • Other legislation could include: Official Secrets Act 1989, The Privacy and ElectronicCommunications Regulations 2003.

AC 3.2:

  • Ethical conduct could include: adherence to organisational IT policies and procedures, maintaining confidentiality, adherence to applicable laws, promoting information security, refraining from conflicts of interest.
  • Unethical conduct could include: sabotage, disclosing or misusing confidential information, maliciously injuring the reputation or prospects of an individual or organisation.

The quoted price covers up to 3000 words. For custom requirements Live Chat or Whatsapp Click Here



                             

Email: [email protected]

100% Plagiarism Free & Custom Written, Tailored to your instructions

Our Giveaways

Plagiarism Report

for د.إ50 Free

Formatting

for د.إ32 Free

Title page

for د.إ20 Free

Bibliography

for د.إ36 Free

Outline

for د.إ19 Free

Limitless Amendments

for د.إ38 Free

Get all these features for
د.إ195.00 FREE

ORDER NOW
assignment bank giveaways

Our Ratings