Criado por dominik los
mais de 7 anos atrás
|
||
Questão | Responda |
Threats to ICT systems | Employees Human error Viruses Spyware |
Reasons for security breaches | Satisfaction Personal gain Financial gain Sabotage |
Means of control of threat | password-based login firewalls digital signatures |
Data encryption | Scrambling data so it cant be understood if intercepted. encryption keys used to understand the message. |
Ways of protecting ICT systems: Hardware measures | computers can be fixed to surface or locked in cabinets. restricting access to IT rooms using smart cards. locks and alarms also increase security. |
Ways of protecting ICT systems: Software measures | access rights networks security software |
Ways of protecting ICT systems: Procedures | e |
data protection act 1998 data subject rights: | - see what data is held about them. - have any errors corrected. -refuse sensitive data. - complain to data protection commissioner. - claim compensation if act is abused. |
Computer misuse act |
Quer criar seus próprios Flashcards gratuitos com GoConqr? Saiba mais.