Security Policies

Description

AS Levels A2 ICT - Use and Impact of ICT (6. Database Systems) Flashcards on Security Policies, created by Henry Cookson on 09/01/2015.
Henry Cookson
Flashcards by Henry Cookson, updated more than 1 year ago
Henry Cookson
Created by Henry Cookson almost 10 years ago
27
2

Resource summary

Question Answer
What are some potential threats to data & the consequences for data misuse ? 1. Deliberate misuse / damage 2. Accidental abuse 3. Natural disasters 4. Faulty hardware or software 5. Theft
Name some factors to take into account when designing security policies 1. Physical security 2. Logical (software) security 3. Operational procedures 4. Personnel administration
Name some operational procedures for preventing misuse of data 1. Screening potential employees 2. . Routines for distributing updated virus information and virus scanning procedures 3. Define procedures for downloading from the Internet, use of removable media, personal backup procedures 4. Establish security rights for updating web pages 5. Establish a disaster recovery programme 6.Set up auditing procedures (Audit trails) to detect misuse
Name some methods of prevention of accidental misuse 1. Backup and recovery procedures 2. Standard backups to removable media 3. RAID systems – mirror discs (Redundant Array of Inexpensive Disc) 4. Grandfather, Father, Son systems 5. Backing up program files
Name some methods prevention of deliberate crimes or misuse 1. Methods for controlling access to computer rooms 2. Methods of securing integrity of transmitted data e.g. encryption methods including private and public keys, and call-back procedures for remote access 3. Establish firewalls 4. Proxy servers 5. Methods to define security status and access rights for users 6. Methods for physical protection of hardware and software 7. Security of document filing systems
Risk Management: costs and control 1. Identify potential risks 2. Likelihood of risk occurring 3. Short and long term consequences of threat 4. How well equipped is the company to deal with threat 5. The disaster recovery programme
Show full summary Hide full summary

Similar

Networks
Will8324
Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
All AS Maths Equations/Calculations and Questions
natashaaaa
Biological Definitions
Yamminnnn
Using GoConqr to teach French
Sarah Egan
Using GoConqr to teach science
Sarah Egan
Using GoConqr to study geography
Sarah Egan
Using GoConqr to study Economics
Sarah Egan
Using GoConqr to study English literature
Sarah Egan
Using GoConqr to learn French
Sarah Egan