book a hotel room on-line and his favourite hotel chain is called the Interlinks Group. The group owns hundreds
of hotels throughout the world including seven hotels in Mauritius. Each hotel has different facilities.
(a) He uses an Internet search engine to find an Interlinks hotel with a meeting room, anywhere in Mauritius
except in Port Louis. Provide an overview of the mechanisms employed by Internet search engines to
produce the correct search results.
Googlebot, a web crawler that finds and fetches web pages.
The indexer that sorts every word on every page and stores the resulting index of words in a huge
database.
The query processor, which compares your search query to the index and recommends the documents
that it considers most relevant.
Let’s see how Google processes a query.
(b) When he makes his reservation with the hotel his personal details and credit card information are stored
in a database and he receives a booking reference number.
(i) Describe the principles of the Mauritian legislation that protects information stored in this way?
Developed law on Computer Misuse and Cybercrime Act (2203) to provide for repression of criminal activities
committed through internet/ computer systems.
, ii. To strengthen the legal framework for fighting cyber security, the following Acts were also developed;
a. Data Protection Act
b. ICT Act 2001
c. Electronic Transaction Act 200
d. Copyright Act 1997
e. Policy Framework for ISPs
f. Fair Trading Act
iii. The Information and Communication Technologies Authority (ICTA) was established to regulate the ICT
sector in areas like telecommunications, usage of the internet and data protection.
iv. The Computer Emergency Response Team for Mauritius (CERT-MU) was established with the following
main goals;
a. Handle security incidents and monitor security problems occurring within public and private sectors.
b. Provide guidance to providers of critical information infrastructure to adopt best practices in information
security.
c. Warn and educate systems administrators and users about latest information security threats and suggest
countermeasures by means of information dissemination.
(ii) What are the risks associated with sending credit card information over the internet? How can the risks be
minimised?
1. Someone who is watching Internet traffic may see your account number as it goes by and use it to buy
stuff for themselves.
2. You don't really know who you're sending your account number to.
3. Someone might break into our computer and steal your credit card number.
Providing your credit card details over the internet through a secure site is usually safer because you know that
it is going to the organisation intended. However, to minimise any risks, remember the following:
* When providing your credit card details online, ALWAYS use secure and reputable sites. You can tell if a site
is secure by the small padlock icon at the bottom of your screen which indicates encryption technology is being
used
* Check your statements. Report any discrepancies to your bank immediately
The golden rule is to use as much common sense as you would with face to face or telephone transactions. Only
deal with online companies that you know are reputable.
(c) What are productivity software? List four examples of common productivity software used by
businesspersons.