Potential Threats to ICT Systems

Description

A Levels ICT Mind Map on Potential Threats to ICT Systems, created by 08shunt.gemma on 13/11/2014.
08shunt.gemma
Mind Map by 08shunt.gemma, updated more than 1 year ago
08shunt.gemma
Created by 08shunt.gemma about 10 years ago
18
1

Resource summary

Potential Threats to ICT Systems
  1. Deliberate misues/ damage
    1. Viruses
      1. Sabotage
        1. Hacking
          1. Fire
            1. Theft
            2. Accidental Misuse
              1. Deletion of files
                1. Changing settings
                  1. Fires
                  2. Faulty hardware/software
                    1. Bugs in programs
                      1. Equipment malfunction
                        1. Loss of communication systems
                        2. Natural disasters
                          1. Flood
                            1. Earthquakes
                              1. Volcanoes
                                1. Hurricanes/ gales
                                2. Theft
                                  1. Hardware theft
                                    1. Software theft
                                      1. Data theft
                                      Show full summary Hide full summary

                                      Similar

                                      Networks
                                      Will8324
                                      Types and Components of Computer Systems
                                      Jess Peason
                                      Input Devices
                                      Jess Peason
                                      The Weimar Republic, 1919-1929
                                      shann.w
                                      Globalisation Case Studies
                                      annie
                                      Random German A-level Vocab
                                      Libby Shaw
                                      Sociology: Crime and Deviance Flash cards
                                      Beth Morley
                                      Functionalist Theory of Crime
                                      A M
                                      Output Devices
                                      Jess Peason
                                      Milgram (1963) Behavioural study of Obediance
                                      yesiamanowl
                                      Realist Theories
                                      A M