policies and stratagies

?
V T D C C G R V Y I R L N G U E W I S S R
K E W Y O L O R K U G K D H N P I N Q F W
X P D P N L J M I X X O C E A O G Q Q K L
T H U P T C G L L V S R H L Y V E D H G U
F E V S R D A T A F L O W D I A G R A M Y
T R W O A E X T E R N A L E N T I T Y G K
I G C V C O E G P S T E C H N O L O G Y T
A D A P T I V E M A I N T E N A N C E Q S
R M L B O N H D L N A N G E I Y W N T H S
I C J V F U Y U V T U N C B H T M M M A T
S X Y S E C U R I T Y O F D A T A X A X P
K C H W M P R I V A C Y O F D A T A W G S
A G H O P B X Q X R M P U O J X H L P R H
N J V R L D U R P F R B R K R D F R I U Y
A B A G O F X N O B E C J G L D A H G G S
L D H W Y I S U P E R C O M P U T E R S S
Y K G P M D V G U M Q H W V I M K P Q K W
S Y S T E M S F L O W C H A R T M Q T F A
I H D U N P G Y Q Q M O A E I N N O G S O
S J A E T V W X Y L F N J T S I F R H X S
Y S W P I E W B N E G U C Y W N I J U C Y

Clues

  • A diagram that shows how data moves through a system, showing where the data comes from, what processes it passes through and where it goes to within an organisation (4, 4, 7)
  • A diagram vused to define the flow of data through a system (7, 4, 5)
  • Global positioning system technology tracks the position of objects using satellites (3, 10)
  • Involves ensuring that data is not seen or accessed by anyone who is not authroised to view it (7, 2, 4)
  • Involves making alterations to respond to changes in the organisation or external changes such as a new security risk (8, 11)
  • Involves making sure that an organisation's data is correct, is kept confidential and is safe (8, 2, 4)
  • Mainframe computers that are amongst the most powerful computers at any particular time (14)
  • Someone outside of your system who puts data in, e.g. a customer buying goods, or someone who receives data or information from the system, i.e a manager receiving a report (8, 6)
  • The legal agreement between an employer and an employee (8, 2, 10)
  • Used to identify each element of a successful information system and to place a value to the business on that element. It then identifies any potential threats to that element, predicting the likelihood of the threat occuring. (4, 8)

Comments

chickentikamosalah

Report

decent did in 2 mins 30

Similar ICT resources:

See all ICT resources »See all policies resources »