Created by ben goddard
about 11 years ago
|
||
Question | Answer |
Data security physical methods. | Keep ICT equipment in areas the only authorized people can enter. Use CCTV cameras to see who goes in. Lock the door to keep unwanted visitors out. Clamp the expensive to replace equipment down. |
Data security software methods | Give each user a username and password to gain access to the server. Use secure passwords and security questions. Encrypt files so if intercepted they can't be read. firewalls |
Data Encryption. | Is the most effective way to achieve data security. When sent the data is scrambled into a code so that it can't be read if it is intercepted and is only unscrambled when it reaches it's intended target. |
Different ways to store data. | USB CD ROM floppy disk magnetic tape hard drive |
Want to create your own Flashcards for free with GoConqr? Learn more.