Methods to prevent deliberate destruction/misuse of data

View mindmap
  • Methods to prevent deliberate destruction/misuse of data
    • Methods of controlling access to computer rooms
    • Methods of securing integrity of transmitted data e.g encryption
    • Methods including private and public keys
    • Call back procedures for remote access
    • Establish firewalls
    • Use virus scanners
    • Proxy servers
    • Password systems
    • Methods to define security status and access rights for users
    • Methods for physical protection of hardware and software
    • Security of document filing system

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »