Security Policies

Security Policies topic for A2 ICT

HideShow resource information

Where Do Threats Come From?

These are some of the threats that can occur:-

  • Viruses
  • Sabotage
  • Deliberate abuse by staff
  • Fire
  • Natural Disaster
  • Terrorism
  • Hacking
  • Accidental Abuse by staff
  • Theft
  • Faulty Hardware or Software
1 of 6

Consequences of Threats

Threats to ICT systems can cause the loss of data which can have certain consequences:-

  • Legal Action
  • Lost Business
  • Lack of confidence by customers or members of the public
  • Lost computer time
  • The need for staff to spend time sorting problems out
2 of 6

Earthquake

Earthquakes can lead to a loss of power, loss of communication lines, damage to ICT systems caused by building collapse,etc.

(http://www.december212012.info/images/Japan_earthquake.jpg)

3 of 6

Lightning Strikes

Lightning Stirikes can cause momentary losses of power which can cause data loss. Lightning can also cause more serious damage with the complete loss of hardware, software and data.

 (http://news.bbcimg.co.uk/media/images/49482000/jpg/_49482272_caters_lightning_new_york_01.jpg)

4 of 6

Floods

Floods can lead to water damage to hardware, software and data, loss of power or communication lines.

(http://i.telegraph.co.uk/multimedia/archive/01827/Floods2_1827722b.jpg)

5 of 6

Threats From Faulty Hardware or Software

Computers can go wrong at anytime, its easy to replace hardware but it's not as easy to replace programs or data.

Faulty Hardware- computer is fairly reliable but can and does break down. The main problem would be caused by the hard drive becoming damaged, rendering the data and the programs unusuable.

Faulty Software- software, especially bespoke software, and sometimes packaged software, can contain errors (or bugs as they are called) and these cause damage or loss of data.

(http://www.techdigest.tv/broken-hard-drive-thumb-400x255.jpg)(http://www.grifo.com/SOFT/FOTO/MO52_WORK.gif)

6 of 6

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Policies, Security and Legislation resources »