Potential Threats to ICT Systems

Descrição

A Levels ICT Mapa Mental sobre Potential Threats to ICT Systems, criado por 08shunt.gemma em 13-11-2014.
08shunt.gemma
Mapa Mental por 08shunt.gemma, atualizado more than 1 year ago
08shunt.gemma
Criado por 08shunt.gemma mais de 9 anos atrás
18
1

Resumo de Recurso

Potential Threats to ICT Systems
  1. Deliberate misues/ damage
    1. Viruses
      1. Sabotage
        1. Hacking
          1. Fire
            1. Theft
            2. Accidental Misuse
              1. Deletion of files
                1. Changing settings
                  1. Fires
                  2. Faulty hardware/software
                    1. Bugs in programs
                      1. Equipment malfunction
                        1. Loss of communication systems
                        2. Natural disasters
                          1. Flood
                            1. Earthquakes
                              1. Volcanoes
                                1. Hurricanes/ gales
                                2. Theft
                                  1. Hardware theft
                                    1. Software theft
                                      1. Data theft

                                      Semelhante

                                      Networks
                                      Will8324
                                      Types and Components of Computer Systems
                                      Jess Peason
                                      The Weimar Republic, 1919-1929
                                      shann.w
                                      Input Devices
                                      Jess Peason
                                      Globalisation Case Studies
                                      annie
                                      Random German A-level Vocab
                                      Libby Shaw
                                      Sociology: Crime and Deviance Flash cards
                                      Beth Morley
                                      Functionalist Theory of Crime
                                      A M
                                      Output Devices
                                      Jess Peason
                                      Milgram (1963) Behavioural study of Obediance
                                      yesiamanowl
                                      Realist Theories
                                      A M