ICT Topic 5 - methods

?
  • Created by: ellen
  • Created on: 26-05-15 10:14
What types of Measures can be taken to protect ICT systems?
Hardware measures, Software measures and Procedures.
1 of 12
What are hardware measures?
Computers and other equipment that can be used to reduce threats.
2 of 12
What are access restrictions?
Access to computer rooms can be restricted by using keypads using biometrics.
3 of 12
How does one lock keyboards?
System uses a card and a card reader to restrict access.
4 of 12
How can the use of user-IDs/usernames?
You can identify the user and can allocate resources.
5 of 12
what are access rights?
Restrict a users access to the files they only need to perform their job.
6 of 12
What are firewalls?
Piece of software, hardware or both that is able to protect a network from hackers.
7 of 12
What is encryption?
Scrambles data as it passed along communication lines or wirelessly so even if its intercepted it makes no sense to the interceptor.
8 of 12
What are procedures?
Management controls that are put in place to ensure that users work in a way that reduces or eliminates the threats to ICT systems.
9 of 12
What is separation of duties?
Two or more people should be involved in dealing with an order.
10 of 12
What is non-disclosure?
Non-disclosure agreements prevent employees passing on confidential information to others.
11 of 12
What are audit trails?
Audit trails make it possible to track all details of a particular transaction?
12 of 12

Other cards in this set

Card 2

Front

What are hardware measures?

Back

Computers and other equipment that can be used to reduce threats.

Card 3

Front

What are access restrictions?

Back

Preview of the front of card 3

Card 4

Front

How does one lock keyboards?

Back

Preview of the front of card 4

Card 5

Front

How can the use of user-IDs/usernames?

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Methods topic 5 resources »