Security Policies

Descripción

AS Levels (6. Database Systems) A2 ICT - Use and Impact of ICT Fichas sobre Security Policies, creado por Henry Cookson el 09/01/2015.
Henry Cookson
Fichas por Henry Cookson, actualizado hace más de 1 año
Henry Cookson
Creado por Henry Cookson hace más de 9 años
22
2

Resumen del Recurso

Pregunta Respuesta
What are some potential threats to data & the consequences for data misuse ? 1. Deliberate misuse / damage 2. Accidental abuse 3. Natural disasters 4. Faulty hardware or software 5. Theft
Name some factors to take into account when designing security policies 1. Physical security 2. Logical (software) security 3. Operational procedures 4. Personnel administration
Name some operational procedures for preventing misuse of data 1. Screening potential employees 2. . Routines for distributing updated virus information and virus scanning procedures 3. Define procedures for downloading from the Internet, use of removable media, personal backup procedures 4. Establish security rights for updating web pages 5. Establish a disaster recovery programme 6.Set up auditing procedures (Audit trails) to detect misuse
Name some methods of prevention of accidental misuse 1. Backup and recovery procedures 2. Standard backups to removable media 3. RAID systems – mirror discs (Redundant Array of Inexpensive Disc) 4. Grandfather, Father, Son systems 5. Backing up program files
Name some methods prevention of deliberate crimes or misuse 1. Methods for controlling access to computer rooms 2. Methods of securing integrity of transmitted data e.g. encryption methods including private and public keys, and call-back procedures for remote access 3. Establish firewalls 4. Proxy servers 5. Methods to define security status and access rights for users 6. Methods for physical protection of hardware and software 7. Security of document filing systems
Risk Management: costs and control 1. Identify potential risks 2. Likelihood of risk occurring 3. Short and long term consequences of threat 4. How well equipped is the company to deal with threat 5. The disaster recovery programme
Mostrar resumen completo Ocultar resumen completo

Similar

Networks
Will8324
Types and Components of Computer Systems
Jess Peason
Input Devices
Jess Peason
Using GoConqr to teach French
Sarah Egan
Using GoConqr to teach science
Sarah Egan
Using GoConqr to study geography
Sarah Egan
Using GoConqr to study Economics
Sarah Egan
Using GoConqr to study English literature
Sarah Egan
Using GoConqr to learn French
Sarah Egan
A Level: English language and literature techniques = Structure
Jessica 'JessieB
A Level: English language and literature technique = Dramatic terms
Jessica 'JessieB