1.5 IT Security Protocols Flashcards
1
Q
Identify 2 way as information stored on a computer can be protected ? (2)
A
One way would be through having a password
Another way is through downloading a anti virus software.
2
Q
What are inappropriate uses of ICT equipment and software?
A
Using workplace computers for social media.
Installing unauthorised software e.g games.
Business only software installed on home computers.
3
Q
What are consequences of inappropriate use of IT computers?
A
Include wasted business time, charges of gross misconduct and fines for breaking laws.