Pages in this set

Page 1

Preview of page 1
Protecting ICT Systems

Page 2

Preview of page 2
Internal & external threats
Data & programs are vulnerable to both deliberate and
accidental damage, ranging from:
­ A floppy disk which becomes unusable
­ To hackers stealing millions from a major organisation
Internal threats:
­ Hardware failure
­ Faulty procedures
­ Natural disasters
­ Remote systems or laptops may…

Page 3

Preview of page 3
Measures to protect systems
Physical restrictions
Login procedures ­ UserID and passwords
Levels of access
Audit software

Page 4

Preview of page 4
Types of backup
Online backup
­ Often simultaneous update of 3 systems ­ one remote
from the other 2
Periodic backups
­ Daily ­ stored off-site in a fireproof safe
­ Possible now to back up to internet providers
Backup of laptop data
­ Protects business in the event of…

Page 5

Preview of page 5
Other measures
Virus checkers
­ Regular update of virus template is required to combat
new viruses
­ Responsible companies do not allow downloads from
internet or execution of attachments to e-mail
­ Careful vetting of staff
­ Comprehensive staff training
­ Considered siting of computer equipment to avoid basic

Page 6

Preview of page 6
Internet access issues
Internet contains much unsuitable material
Schools must guard against:
­ Pupils accessing pornographic materials
­ Participation in chat rooms where pupils may be exposed to
undesirable strangers
Business may want to control use of e-mail
Some organisations achieve this by installing and
maintaining their own intranet (private…


Mr A Gibson


Number three of three presentations which provide a good overview of this topic area.

Resource 1 - Security of Data

Resource 2 - Computer Crime - this resource

Resource 3 - Protecting ICT Systems - this resource

Download these to your mobile device and review on the go!

Similar ICT resources:

See all ICT resources »