Modern Tech1
Modern Tech2
Threats to Data B1
Threats to Data B2
Responsible Use
100

A temporary wireless network that does not rely on fixed hardware such as routers, e.g. a personal hotspot created using a mobile phone

AD HOC

100

Travel to and from your place of work – eliminated when working from home

COMMUTE

100

Hacker who attempts to hack into systems for criminal reasons to steal data or extort money

BLACK HAT

100

Software used to identify and remove malware

ANTIVIRUS

100

Material left over from manufacturing a product or the product itself upon reaching end of life – needs to be recycled or disposed of

WASTE

200

Area without mobile phone coverage – e.g. a valley surrounded by high mountains

BLACK SPOT

200

Electronic form of messaging sent between individuals, employees, businesses and customers; sometimes with attachments or other media

EMAIL

200

Malware that restricts a user's access to their computer system to make them give money to the attacker

RANSOMWARE

200

If you need to type in your address, some of the fields might appear pre?populated if you've typed in your address before

AUTOCOMPLETE

200

Process where existing technology is replaced with newer or higher?performance technolog

UPGRADING

300

Using online services instead of local applications – e.g. editing a document from a web browser

CLOUD COMPUTING

300

Working away from the office such as at home

REMOTE WORKING

300

When an employee deliberately discloses confidential information outside of their organisation

LEAKING

300

Use of personal identifiable features to grant access to a system, e.g. fingerprints, iris, voice

BIOMETRICS

300

Increased digital surveillance and the rise of social media have led to concerns relating to this

PRIVACY

400

Data storage technology where data is stored on remote servers accessed from the Internet

CLOUD STORAGE

400

For most people, working with and collaborating with others relieves boredom and is stimulating, improving their

MENTAL WELL-BEING

400

The duration that systems are not operational, e.g. if taken offline to investigate a security breach

DOWNTIME

400

Scrambling data so that it can only be read by users with the appropriate translation 'key'

ENCRYPTION

400

After an attack, the first stage is to ____ – to see what happened and how bad the attack was

INVESTIGATE

500

Software that allows several people to communicate online or share and edit documents (sometimes simultaneously)

COLLABORATION TOOLS

500

A description of an image on a page so that screen readers can read out a description of the image

ALT TEXT

500

Spying on governments and businesses to obtain secrets / trade secrets / intellectual property, including access and data theft by hackers

ESPIONAGE

500

General term applied to devices which have been designed or modified to prevent intrusion by hackers or malware

Device Hardening

500

Set of rules which govern or restrict the ways in which a computer system or network may be used

ACCEPTABLE USE POLICY