ICT- security policies

Name where threats come from
Natural diasaster. faulty hardware or software. fire. hacking.
1 of 8
what can be done to reduce threats
logical security (software). checking irregluartons. physical security. audit trails. staff coded of conduct and responsibilities.
2 of 8
operation procdeues to prevent misuse of a system
setting up audit trails for misuse. establish a disaster recovbery programme. establish security rightsfor updating web pages
3 of 8
what are back up procedures
actions taken by people or organisation to ensure regular back up copies are taken
4 of 8
where does the organisation keep the back up copies
off site in a safe secure place.
5 of 8
describe schdeulling back ups
best to take back ups when the computers are not in use becausde the system will slow down.
6 of 8
how can prevention of deliberate crimes or misuse be avioded
controlling access to computers rooms. physical security of hardware and software. define acces rights for users
7 of 8
Describe cost and control
risk analysis. identify potential risks. how well is copany eeqipped to cope with a threat. likleyhood of the risk occuring. short and long term consequences of the risk.
8 of 8

Other cards in this set

Card 2

Front

what can be done to reduce threats

Back

logical security (software). checking irregluartons. physical security. audit trails. staff coded of conduct and responsibilities.

Card 3

Front

operation procdeues to prevent misuse of a system

Back

Preview of the front of card 3

Card 4

Front

what are back up procedures

Back

Preview of the front of card 4

Card 5

Front

where does the organisation keep the back up copies

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all security policies resources »