Created by Henry Cookson
almost 10 years ago
|
||
What are some potential threats to data & the consequences for data misuse?
Name some factors to take into account when designing security policies
Name some operational procedures for preventing misuse of data
Name some methods of prevention of accidental misuse
Name some methods prevention of deliberate crimes or misuse
Risk Management: costs and control