section 13

Descripción

section 13
dominik los
Fichas por dominik los, actualizado hace más de 1 año
dominik los
Creado por dominik los hace más de 7 años
2
0

Resumen del Recurso

Pregunta Respuesta
Threats to ICT systems Employees Human error Viruses Spyware
Reasons for security breaches Satisfaction Personal gain Financial gain Sabotage
Means of control of threat password-based login firewalls digital signatures
Data encryption Scrambling data so it cant be understood if intercepted. encryption keys used to understand the message.
Ways of protecting ICT systems: Hardware measures computers can be fixed to surface or locked in cabinets. restricting access to IT rooms using smart cards. locks and alarms also increase security.
Ways of protecting ICT systems: Software measures access rights networks security software
Ways of protecting ICT systems: Procedures e
data protection act 1998 data subject rights: - see what data is held about them. - have any errors corrected. -refuse sensitive data. - complain to data protection commissioner. - claim compensation if act is abused.
Computer misuse act
Mostrar resumen completo Ocultar resumen completo

Similar

Modelos Atómicos
Raúl Fox
Disoluciones Químicas
maya velasquez
Estudio de Mercado
dggr9980
Mapa conceptual
karina montealeg
Química Orgánica
pedro.casullo
FLUJOGRAMA
albaluciagpb30
Present Simple
Billy Yañez
Métodos anticonceptivos
Sara Donado
Sistema Nervioso
Carlos Enrique Armas Montoro
LOS MOMENTOS DEL PROCESO DE APRENDIZAJE
Alejandro Correa
Mapa de navegacion aulas virtuales
Blanca Emilce BERNAL ANTONIO