This cloud feature allows a team to work on a single version of a file simultaneously.
What is Collaboration?
A security method requiring "who you are, what you know, and what you have" before granting access.
What is Two-Factor Authentication (2FA)?
The legal right for an individual to have their personal data removed from internet searches and records.
What is the Right to be Forgotten?
A visual notation used to represent a process or a step-by-step solution to a problem.
What is a Flowchart?
A method of sharing a mobile device's internet connection with other devices to create an ad hoc network.
What is Tethering (or Personal Hotspot)?
Malicious software such as viruses, worms, botnets, and ransomware.
What is Malware?
These are used to identify and protect an organisation's creations, such as trademarks, patents, and copyrights.
What is Intellectual Property (IP)?
This form of notation uses rows and columns to organize and represent data for quick reference or comparison.
What is a Table?
When an organization transitions to cloud technologies, they must evaluate the service provider’s security procedures and their own "Disaster Recovery Policy". Explain why the compatibility of existing infrastructure and staff expertise are critical risks during this transition.
What are Implications for Organizations?
Organizations must ensure their current devices can communicate with the cloud and that staff have the technical skills to maintain the new system without significant downtime.
The ability to increase or decrease IT resources, such as storage, by renting more or freeing up space to save money.
What are World (or Distributed) Teams?
This internal threat occurs when an employee accidentally shares sensitive data without meaning to.
What is Unintentional Disclosure?
The principle that all internet traffic should be treated equally by service providers without discrimination.
What is Net Neutrality?
A diagrammatic form of notation that specifically maps out the flow of data within a digital system.
What is a Data Flow Diagram (DFD)?
An organization discovers that a "Black Hat" hacker has gained "Unauthorised Access" to their server. Following the Actions to Take After an Attack protocol, identify the stage that involves informing appropriate authorities and the stage that involves updating policies to prevent a repeat.
What are Respond and Analyse?
"Respond" involves updating stakeholders and authorities , while "Analyse" is the final step where policies and procedures are updated based on what was learned.
The ability to increase or decrease IT resources, such as storage, by renting more or freeing up space to save money.
What is Scalability?
The process of "white hat" hackers testing a system for vulnerabilities to improve its security.
What is Penetration Testing (or Ethical Hacking)?
Small files used by websites to track user activity and store transactional data.
What are Cookies?
In a Data Flow Diagram (DFD), this specific component is used to represent a place where data is held or kept for later use.
What is a Data Store?
Under the Data Protection Principles, organizations must ensure data is processed lawfully and not transferred to countries with less protection. Identify the principle that restricts an organization from keeping a customer's data indefinitely.
"Kept only as long as is necessary"?
This principle ensures that data is not stored for longer than its original specific purpose requires.
This type of policy defines how an organisation and its service provider will restore data and systems after a major failure.
What is a Disaster Recovery Policy?
A specific cyber attack that redirects a user from a legitimate website to a fake one to steal their data.
What is Pharming?
This document defines the expected and prohibited behaviors for individuals using an organisation’s IT assets .
What is an Acceptable Use Policy (AUP)?
Draw an example of a flowchart segment where a process repeats until a specific condition is met making a loop

When using forms of notation to represent a system, a student must differentiate between a flowchart and a Data Flow Diagram (DFD). While a flowchart shows the sequence of steps, what specific notation is used in a DFD to represent the movement of data between an "external entity" and a "process"?.
What is a Data Flow (or Data Flow Arrow)?
DFDs use standard conventions to show how data is exchanged between entities, processes, and data stores.