Erstellt von ben goddard
vor etwa 11 Jahre
|
||
Frage | Antworten |
Data security physical methods. | Keep ICT equipment in areas the only authorized people can enter. Use CCTV cameras to see who goes in. Lock the door to keep unwanted visitors out. Clamp the expensive to replace equipment down. |
Data security software methods | Give each user a username and password to gain access to the server. Use secure passwords and security questions. Encrypt files so if intercepted they can't be read. firewalls |
Data Encryption. | Is the most effective way to achieve data security. When sent the data is scrambled into a code so that it can't be read if it is intercepted and is only unscrambled when it reaches it's intended target. |
Different ways to store data. | USB CD ROM floppy disk magnetic tape hard drive |
Möchten Sie mit GoConqr kostenlos Ihre eigenen Karteikarten erstellen? Mehr erfahren.