Slides in this set

Slide 1

Preview of page 1

Prevention of Deliberate
Crimes or Misuse…read more

Slide 2

Preview of page 2

Access Restrictions
To prevent theft and illegal access to ICT
systems, access to computer rooms can
be restricted by the use of keypads or
biometric testing.
E.g. scanning would mean that only
legitimate NHS staff would be able to
gain access to patient wards.…read more

Slide 3

Preview of page 3

Encryption secures integrity of
transmitted data.
It scrambles data as it is passed along
communication lines so that even if data
is intercepted, it makes no sense to the
E.g. if a patient's personal data is sent to
different departments in a hospital, it
will not be able to be read by a
interceptor, ensuring that data is kept
secure.…read more

Slide 4

Preview of page 4

Proxy Servers
A proxy server is a server which can be
hardware or software that takes requests
from users for access to other servers and
either forwards them onto other servers or
denies access to the servers.
Proxy servers can be used to limit or block
access to certain web addresses.
E.g. a hospital may use a proxy server to
provide content filtering and to ensure that
their employees adhere to their acceptable
use policy.…read more

Slide 5

Preview of page 5

Security of Document Filing Systems
Users must protect documents stored
on their laptop computers and these are
more likely to be stolen as they are used
in public places and put in cars.
Printouts or reports should be locked
away when not being used and
shredded before being out in a
wastepaper bin.
E.g. patient medical sheets should be
shredded if they are no longer needed.…read more

Slide 6

Preview of page 6

Physical Protection of Hardware and Software
Lock doors and PCs to the desk.
This prevents access to the room and
prevents theft.
E.g. in a doctor's surgery ensure that all
doors are locked before you leave the
building.…read more


No comments have yet been made

Similar ICT resources:

See all ICT resources »