Methods to prevent deliberate destruction/misuse of data
- Created by: cgribben99
- Created on: 20-02-18 14:31
View mindmap
- Methods to prevent deliberate destruction/misuse of data
- Methods of controlling access to computer rooms
- Methods of securing integrity of transmitted data e.g encryption
- Methods including private and public keys
- Call back procedures for remote access
- Establish firewalls
- Use virus scanners
- Proxy servers
- Password systems
- Methods to define security status and access rights for users
- Methods for physical protection of hardware and software
- Security of document filing system
Similar ICT resources:
Teacher recommended
Teacher recommended
Comments
No comments have yet been made