1.5 IT Security Protocols Flashcards

1
Q

Identify 2 way as information stored on a computer can be protected ? (2)

A

One way would be through having a password
Another way is through downloading a anti virus software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are inappropriate uses of ICT equipment and software?

A

Using workplace computers for social media.
Installing unauthorised software e.g games.
Business only software installed on home computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are consequences of inappropriate use of IT computers?

A

Include wasted business time, charges of gross misconduct and fines for breaking laws.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly