What the different tools are that can be used for data validation
•
How validation can reduce user errors
•
What the different tools are that can be used for data verification
•
How verification can reduce user errors
•
The different primary methods of collecting data and their advantages and disadvantages
•
The different secondary methods of collecting data and their advantages and disadvantages
•
The advantages and disadvantages of storing data in a logical location
•
The advantages and disadvantages of storing data in a physical location
•
The characteristics of each internal and external storage device and their advantages and disadvantages
•
Why testing is needed and the effects of not testing and its advantages and disadvantages
•
What each type of test data is and the role each plays
•
The advantages and disadvantages of technical testing and of user testing
R
A
FT
•
Topic Area 4:
•
D
Cyber-security and legislation
The definition of each of the following threats: denial of service (DoS), hacking (black/white/grey), malware, adware, botnet, ransomware, spyware, Trojan Horse, virus, worm, social engineering, baiting, phishing, pretexting, quid pro quo, scareware and shoulder surfing
Revision checklist
•
Why each of the threats are used by attackers
•
How each of the threats are used by attackers
•
How each threat works
•
How the methods of social engineering can be used to collect data and information
•
How each of the threats can be prevented
•
What data destruction is and the impact it can have on an individual and organisation
17
Original material © Cambridge University Press 2022. This material is not final and is subject to further changes prior to publication.