Potential Threats to ICT Systems

Descripción

A Levels ICT Mapa Mental sobre Potential Threats to ICT Systems, creado por 08shunt.gemma el 13/11/2014.
08shunt.gemma
Mapa Mental por 08shunt.gemma, actualizado hace más de 1 año
08shunt.gemma
Creado por 08shunt.gemma hace más de 9 años
18
1

Resumen del Recurso

Potential Threats to ICT Systems
  1. Deliberate misues/ damage
    1. Viruses
      1. Sabotage
        1. Hacking
          1. Fire
            1. Theft
            2. Accidental Misuse
              1. Deletion of files
                1. Changing settings
                  1. Fires
                  2. Faulty hardware/software
                    1. Bugs in programs
                      1. Equipment malfunction
                        1. Loss of communication systems
                        2. Natural disasters
                          1. Flood
                            1. Earthquakes
                              1. Volcanoes
                                1. Hurricanes/ gales
                                2. Theft
                                  1. Hardware theft
                                    1. Software theft
                                      1. Data theft
                                      Mostrar resumen completo Ocultar resumen completo

                                      Similar

                                      Networks
                                      Will8324
                                      Types and Components of Computer Systems
                                      Jess Peason
                                      The Weimar Republic, 1919-1929
                                      shann.w
                                      Input Devices
                                      Jess Peason
                                      Globalisation Case Studies
                                      annie
                                      Random German A-level Vocab
                                      Libby Shaw
                                      Sociology: Crime and Deviance Flash cards
                                      Beth Morley
                                      Functionalist Theory of Crime
                                      A M
                                      Output Devices
                                      Jess Peason
                                      Milgram (1963) Behavioural study of Obediance
                                      yesiamanowl
                                      Realist Theories
                                      A M