1.5 Flashcards

1
Q

What are IT security protocols

A

Procedures put in place in relation to the appropriate use of IT equipment and software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Two things IT Protocols cover

A

Preventing unauthorised access

Inappropriate use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In order to prevent unauthorised access business should make use of:

A
Software tools (Anti virus, and anti spyware)
Password Protection ( networks, computers, documents)
Screen savers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

what is the Point of password protection

A

Ensures only those who need to access the files/ devices will only know the password so it helps prevent unauthorised access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the point of anti spyware and anti virus software

A

Prevents information from being stolen and loss from third party hackers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the point of screen savers

A

Fills device with blank screen or moving images when the computer is not in use so that information/documents are not visible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In order to prevent inappropriate use of IT equipment what should businesses do…

A

Prevent employees from using work place computers for personal reasons
Prevent unauthorised installation of software such as games

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Inappropriate use of IT resources can result in

A

Fines
wasted staff time ( Lower productivity)
Increased business costs ( replacing equipment)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly