100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Other

CRI3701 Assignment

Rating
-
Sold
-
Pages
6
Uploaded on
05-09-2023
Written in
2023/2024

This document is the solution to assignment 2 of CRI3701 for Excellent results

Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Course

Document information

Uploaded on
September 5, 2023
Number of pages
6
Written in
2023/2024
Type
Other
Person
Unknown

Subjects

Content preview

NAMES: RAMBAU WALTER

ID NO: 9506226082086

STUDENT NO: 62376683

MODULE CODE: CRI3701

ASSIGNMENT 2




1

, QUESTION 1

1.1 41Protecting life and property
1.2 42Preserving order
1.3 43Preventing the commission of crime
1.4 44Bringing offenders to justice
1. 545Any duty or responsibility arising from common or statutory law



QUESTION 2

2.1 133Who is responsible for police information held within the agency
2.2 134The purpose of collecting and holding information
2.3 135The safeguards that will be applied to police information held by other agencies
2.4 136What controls are applied to ensure the integrity and security of police
information held by the agency
2.5137The training in place to support the management of police information
2.6 138Arrangements for receiving records and monitoring record keeping
2.7 139How the agency will comply with national and local security policy and standards

QUESTION 3

3.1 Information release: Here an unauthorised person is able to read and take
advantage of information stored in the computer. This category of concern
sometimes extends to “traffic analysis”, in which the intruder observes only the
patterns of information use and from those patterns can infer some information
content. It includes unauthorized use of a proprietary program.

3.2 Unauthorised information modification: An unauthorised person is able to make
changes in stored information – which is regarded as a form of sabotage. Note that
this kind of violation does not require that the intruder see the information he or she
has changed.


3.3 Unauthorised denial of use: Here an intruder can prevent an authorised user from
referring to or modifying information, even though the intruder may not be able to
refer to or modify the information. Causing a system to “crash”, disrupting a
scheduling algorithm or firing a bullet into a computer are examples of denial of use.
This is another form of sabotage.




2
$3.21
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
walternkuna

Also available in package deal

Get to know the seller

Seller avatar
walternkuna
Follow You need to be logged in order to follow users or courses
Sold
2
Member since
4 year
Number of followers
1
Documents
4
Last sold
10 months ago
Nkuna Studies

We sell quality and affordable Assignment Solutions and Exam assistance

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions