Created by Tim Bowater
over 6 years ago
|
||
Accidental damage to hardware or equipment
Deliberate damage to hardware or equipment
List ways how to cause to competitor damage
Inadequate physical security
Loss or theft due to size or portability of devices and the consequences?
Identify and describe the consequences of common types of electronic threats to ICT systems and data
Identify and describe the consequences of security vulnerabilities associated with remote access technologies, including wireless