Threats to ICT systems
Reasons for security breaches
Means of control of threat
Data encryption
Ways of protecting ICT systems:
Hardware measures
Ways of protecting ICT systems:
Software measures
Ways of protecting ICT systems:
Procedures
data protection act 1998
data subject rights:
Computer misuse act