51 A2/A-level resources
4.3.5 - ICT Security Policies - Prevention of Deliberate Misuse
A2/A-level, ICT
Mindmap
Teacher recommended
4.3.5 - ICT Security Policies - Threats and Consequences
A2/A-level, ICT
Mindmap
Teacher recommended
Prevention of Deliberate Crimes or Misuse
A2/A-level, ICT
Presentation
Teacher recommended
ICT WJEC A2 - TOPIC 5: ICT SECURITY POLICIES
A2/A-level, ICT
9 revision cards
Data Protection Act & GDPR Comparison
A2/A-level, ICT
Mindmap
Advantages of Virtual Disaster Recovery Over Physical Disaster Recovery
A2/A-level, ICT
Grid
4.3.5 - ICT Security Policies - Procedures for Preventing Misuse
A2/A-level, ICT
Mindmap
Security Policy: Consequences/ Threats
A2/A-level, ICT
Mindmap
Methods to prevent deliberate destruction/misuse of data
A2/A-level, ICT
Mindmap
PopUp Bank 2018 Pre-release Suggested Revision Topics
A2/A-level, ICT
Mindmap
Topic 6 Legislation
A2/A-level, ICT
6 revision cards
Key Terms - Security Policies
A2/A-level, ICT
10 flashcards
Virtual Disaster Recovery
A2/A-level, ICT
Mindmap
ICT Security Policies Topic 4.3.5
A2/A-level, ICT
Mindmap
Backups
A2/A-level, ICT
Presentation
Security Policies
A2/A-level, ICT
Video
How to prevent deliberate crimes and misuse
A2/A-level, ICT
Presentation
2018 Pre-release - PopUp Bank Security Issues
A2/A-level, ICT
Mindmap
Methods used to prevent accidental misuse of data
A2/A-level, ICT
Mindmap
WJEC A2 ICT IT3 Security Policies - Threats & Consequences
A2/A-level, ICT
Mindmap
Security Policies - Risk Analysis
A2/A-level, ICT
Mindmap
The implication of legislation for ICT policies and organisational procedures
A2/A-level, ICT
9 revision cards
Security Policies
A2/A-level, ICT
6 revision cards
ICT Legislation
A2/A-level, ICT
Quiz
4.3.5 - ICT Security Policies - Factors in Minimising Risk
A2/A-level, ICT
Mindmap