NAMES: RAMBAU WALTER
ID NO: 9506226082086
STUDENT NO: 62376683
MODULE CODE: CRI3701
ASSIGNMENT 2
1
, QUESTION 1
1.1 41Protecting life and property
1.2 42Preserving order
1.3 43Preventing the commission of crime
1.4 44Bringing offenders to justice
1. 545Any duty or responsibility arising from common or statutory law
QUESTION 2
2.1 133Who is responsible for police information held within the agency
2.2 134The purpose of collecting and holding information
2.3 135The safeguards that will be applied to police information held by other agencies
2.4 136What controls are applied to ensure the integrity and security of police
information held by the agency
2.5137The training in place to support the management of police information
2.6 138Arrangements for receiving records and monitoring record keeping
2.7 139How the agency will comply with national and local security policy and standards
QUESTION 3
3.1 Information release: Here an unauthorised person is able to read and take
advantage of information stored in the computer. This category of concern
sometimes extends to “traffic analysis”, in which the intruder observes only the
patterns of information use and from those patterns can infer some information
content. It includes unauthorized use of a proprietary program.
3.2 Unauthorised information modification: An unauthorised person is able to make
changes in stored information – which is regarded as a form of sabotage. Note that
this kind of violation does not require that the intruder see the information he or she
has changed.
3.3 Unauthorised denial of use: Here an intruder can prevent an authorised user from
referring to or modifying information, even though the intruder may not be able to
refer to or modify the information. Causing a system to “crash”, disrupting a
scheduling algorithm or firing a bullet into a computer are examples of denial of use.
This is another form of sabotage.
2
ID NO: 9506226082086
STUDENT NO: 62376683
MODULE CODE: CRI3701
ASSIGNMENT 2
1
, QUESTION 1
1.1 41Protecting life and property
1.2 42Preserving order
1.3 43Preventing the commission of crime
1.4 44Bringing offenders to justice
1. 545Any duty or responsibility arising from common or statutory law
QUESTION 2
2.1 133Who is responsible for police information held within the agency
2.2 134The purpose of collecting and holding information
2.3 135The safeguards that will be applied to police information held by other agencies
2.4 136What controls are applied to ensure the integrity and security of police
information held by the agency
2.5137The training in place to support the management of police information
2.6 138Arrangements for receiving records and monitoring record keeping
2.7 139How the agency will comply with national and local security policy and standards
QUESTION 3
3.1 Information release: Here an unauthorised person is able to read and take
advantage of information stored in the computer. This category of concern
sometimes extends to “traffic analysis”, in which the intruder observes only the
patterns of information use and from those patterns can infer some information
content. It includes unauthorized use of a proprietary program.
3.2 Unauthorised information modification: An unauthorised person is able to make
changes in stored information – which is regarded as a form of sabotage. Note that
this kind of violation does not require that the intruder see the information he or she
has changed.
3.3 Unauthorised denial of use: Here an intruder can prevent an authorised user from
referring to or modifying information, even though the intruder may not be able to
refer to or modify the information. Causing a system to “crash”, disrupting a
scheduling algorithm or firing a bullet into a computer are examples of denial of use.
This is another form of sabotage.
2