Zusammenfassung der Ressource
CCTV SYSTEMS
- THE IMAGES TAKEN AND STORED FOR RETRIEVAL
- DIFFERENT METHODS OF CREATING A COMPUTER NETWORK
- MORAL AND ETHICAL ISSUES TO DO WITH CCTV
- it can invade peoples privacy
- cctv footage can be used to unveil things such as theft or substance abuse
- WAYS A COMPUTER SYSTEM CAN BE PROTECTED
FROM UNAUTHERISED ACCESS
- OFTEN BACK UP YOUR COMPUTER
- USE FILE LEVEL AND SHARE LEVEL SECURITY
- PASSWORD PROTECT DOCUMENTS
- USE EFS ENCRYPTION
- USE DISK ENCRYPTION
- USE IP SECURITY
- UK LAWS ABOUT UNAUTHORISED ACCESS TO
COMPUTERS
- IT IS ILLEGAL TO ACCESS DATA STORING COMPUTERS WITHOUT PERMISSION
- IT IS ILLEGAL TO ACCESS A COMPUTER THAT
HAS INFORMATION THAT CAN BE USED FOR
FURTHER CRIME
- IT IS ILLEGAL TO EDIT ANY DATA ON A COMPUTER WITHOUT PERMISSION
- ACCESSING THESE COMPUTERS WITHOUT PERMISSION IS NAMED HACKING
- THE USE OF FORMS TO CODE DATA FOR A DATABASE
- IMPACTS ON AN ORGANISATION
- REDUCES NEGATIVE IMPACT
- THE USE OF SOFTWARE TO MAINTAIN THE EFFICIENT WORKING OF COMPUTER EQUIPMENT