4.3.5 - ICT Security Policies - Prevention of Deliberate Misuse
Teacher recommended
?- Created by: Annie
- Created on: 05-05-13 18:30
View mindmap
- Prevention of Deliberate Misuse
- Physical Protection of Hardware and Software
- Locking doors and PCs to the desk
- User access rights
- Integrity of Transmitted Data
- Encryption is now widely available and nearly impossible to break down unless the key is known
- Data is now frequently transmitted between company sites, customers etc.
- It is essential that this data cannot be read if intercepted
- Security of Document Filing Systems
- Protection for files stored on secure severs is negated if printouts are not also handled securely
- Locked filing cabinets in physically secure offices and shredding when documents are no longer needed
- Cross cut shredding is better than ***** cut shredding
- Controlling physical access to PCs
- Locks, tracking visitors
- User Security Status and Access Rights
- Users have different access depending on their role
- If a system is set up well, users will not be able to access files which they do not need for their jobs
- Reducing the potential for deliberate misuse
- Establish Firewalls
- Proxy Servers
- It is possible to bypass some filtering software by directing your requests to a different proxy server
- This may also hide the sites you are accessing
- These sites are often forbidden in businesses and schools
- They are often used to filter Internet access and ensure users stick to the code of conduct
- Proxy servers provide access to the Internet and other parts of a network
- Can deny access according to rules (filtering and black lists)
- It is possible to bypass some filtering software by directing your requests to a different proxy server
- Physical Protection of Hardware and Software
Similar ICT resources:
Teacher recommended
Teacher recommended
Comments
No comments have yet been made