Created by dominik los
over 7 years ago
|
||
Question | Answer |
Threats to ICT systems | Employees Human error Viruses Spyware |
Reasons for security breaches | Satisfaction Personal gain Financial gain Sabotage |
Means of control of threat | password-based login firewalls digital signatures |
Data encryption | Scrambling data so it cant be understood if intercepted. encryption keys used to understand the message. |
Ways of protecting ICT systems: Hardware measures | computers can be fixed to surface or locked in cabinets. restricting access to IT rooms using smart cards. locks and alarms also increase security. |
Ways of protecting ICT systems: Software measures | access rights networks security software |
Ways of protecting ICT systems: Procedures | e |
data protection act 1998 data subject rights: | - see what data is held about them. - have any errors corrected. -refuse sensitive data. - complain to data protection commissioner. - claim compensation if act is abused. |
Computer misuse act |
Want to create your own Flashcards for free with GoConqr? Learn more.