section 13

Beschreibung

section 13
dominik los
Karteikarten von dominik los, aktualisiert more than 1 year ago
dominik los
Erstellt von dominik los vor mehr als 7 Jahre
2
0

Zusammenfassung der Ressource

Frage Antworten
Threats to ICT systems Employees Human error Viruses Spyware
Reasons for security breaches Satisfaction Personal gain Financial gain Sabotage
Means of control of threat password-based login firewalls digital signatures
Data encryption Scrambling data so it cant be understood if intercepted. encryption keys used to understand the message.
Ways of protecting ICT systems: Hardware measures computers can be fixed to surface or locked in cabinets. restricting access to IT rooms using smart cards. locks and alarms also increase security.
Ways of protecting ICT systems: Software measures access rights networks security software
Ways of protecting ICT systems: Procedures e
data protection act 1998 data subject rights: - see what data is held about them. - have any errors corrected. -refuse sensitive data. - complain to data protection commissioner. - claim compensation if act is abused.
Computer misuse act
Zusammenfassung anzeigen Zusammenfassung ausblenden

ähnlicher Inhalt

Klausurvorbereitung
AntonS
10 Lernmethoden
AntonS
Publizistik Step 4 Prüfungsvorbereitung
Mona Les
Klausurfragen aktuell
Anne Malten
Aufbau Quellenanalyse
barbara91
Wege, um mit GoConqr Tools zu unterrichten
Elena Koch
Der erste Weltkrieg - Mindmap
andmitterdorfer
Vetie - MiBi 2016
Fioras Hu
Vetie Pharma Datum unbekannt Karteikarten
Alina Stumpf
Vetie Geflügel 2017
Johanna Müller