1.5 Flashcards
What are IT security protocols
Procedures put in place in relation to the appropriate use of IT equipment and software
Two things IT Protocols cover
Preventing unauthorised access
Inappropriate use
In order to prevent unauthorised access business should make use of:
Software tools (Anti virus, and anti spyware) Password Protection ( networks, computers, documents) Screen savers
what is the Point of password protection
Ensures only those who need to access the files/ devices will only know the password so it helps prevent unauthorised access
What is the point of anti spyware and anti virus software
Prevents information from being stolen and loss from third party hackers
What is the point of screen savers
Fills device with blank screen or moving images when the computer is not in use so that information/documents are not visible
In order to prevent inappropriate use of IT equipment what should businesses do…
Prevent employees from using work place computers for personal reasons
Prevent unauthorised installation of software such as games
Inappropriate use of IT resources can result in
Fines
wasted staff time ( Lower productivity)
Increased business costs ( replacing equipment)