section 13

Beschreibung

section 13
dominik los
Karteikarten von dominik los, aktualisiert more than 1 year ago
dominik los
Erstellt von dominik los vor mehr als 7 Jahre
2
0

Zusammenfassung der Ressource

Frage Antworten
Threats to ICT systems Employees Human error Viruses Spyware
Reasons for security breaches Satisfaction Personal gain Financial gain Sabotage
Means of control of threat password-based login firewalls digital signatures
Data encryption Scrambling data so it cant be understood if intercepted. encryption keys used to understand the message.
Ways of protecting ICT systems: Hardware measures computers can be fixed to surface or locked in cabinets. restricting access to IT rooms using smart cards. locks and alarms also increase security.
Ways of protecting ICT systems: Software measures access rights networks security software
Ways of protecting ICT systems: Procedures e
data protection act 1998 data subject rights: - see what data is held about them. - have any errors corrected. -refuse sensitive data. - complain to data protection commissioner. - claim compensation if act is abused.
Computer misuse act
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

American Dream
luisepeters
Wärmelehre Teil 1
Peter Kasebacher
Formeln Volkswirtschaftslehre
Stefan Kurtenbach
Der Erste Weltkrieg
Laura Overhoff
13. Altklausuren - Allgemeinwissen Makro
Rafael Mentges
Vetie - Histo & Embryo - P 2017
Fioras Hu
Steop Hist Fragen
Adrienne Tschaudi
EC- Entwicklungspsychologie 1
Michael B
Vetie Viro 2013
Laura Sieckmann
METH STADA SS 2019
Caroline Hannah
Vetie Geflügelkrankheiten Fragebogen 3
Annika G