Protecting ICT Systems
- Created by: Katie-Louise Griffin
- Created on: 01-06-14 14:09
View mindmap
- Procedures for protecting ICT systems
- Separation of Duties
- No one person being responsible for a process
- Helps prevent fraud
- Non-Disclosure
- Protects business data from falling into competitors' hands
- Protects personal data
- Training
- Prevents user mistakes
- Makes users aware of responsibilites
- Acceptable use policy
- Document outlining what employees can and can't do
- Enforced by disciplinary action
- Separation of Duties
Comments
No comments have yet been made