click below
click below
Normal Size Small Size show me how
IT3 Security
Topic 5 Security
Term | Definition |
---|---|
The 5 potential threats to data & the 3 consequences of data misuse | Deliberate misuse/damage; Accidental abuse; Natural Disasters; Faulty hardware/software; Theft; Consequences: Loss of business and income; Loss of reputation; Legal action |
The 5 factors to take into account when designing security policies | Prevention of misuse; Physical security; Software (Logical) security; Operational procedures; Personnel administration |
6 Operational procedures for preventing misuse of data | Screen employees; updated virus info and scanning proc.; Define proc. for downloading from Internet, use of removable media, personal backup procedures; Establish security rights for updating web pages; disaster recovery; auditing proc. to detect misuse |
5 methods of Prevention of accidental misuse | Backup and recovery procedures; Standard backups to removable media; RAID systems – mirror discs (Redundant Array of Inexpensive Disc); Grandfather, Father, Son systems; Backing up program files |
7 methods of Prevention of deliberate crimes or misuse | Control access to computer rooms; Methods of securing integrity of transmitted data e.g. encryption; Firewalls; Proxy servers; Define security status and access rights for users; Physical pro. of hardware and software; Security of document filing systems |
5 stages of Risk Management: costs and control | Identify potential risks; Identify likelihood of risk occurring; Short/long term conseq. of threat; How well equipped is the company to deal with threat; The disaster recovery program. Make sure you are aware of the 6 main heading. |
Understand | Previous questions have focused on Risk Analysis. |