PHYSICAL SECURITY Computer hardware and software rotter of the inning be damaged and befuddled by: harass Flood Powercut Power surge larceny This damage/ passing bath be prevented in the following slipway: dismiss/flood proof safe to store affirm up turns Fire/burglar alarms Keeping equipment above ground (flood) electronic guards or Spikes (power surges) Generator (power cut) Regularly legal transfer your work Locks} Cameras} Theft Security score} Bolt down equipment} It is vital to on a regular basis take back ups of files in case the originals are lost or damaged. In a business this would be through every night. At home this could be by saving files onto Floppy disk or CDs Businesses normally use magnetic tape or tape streamers. These can store bulky amounts of cultivation, but it is more difficult to find specific files (like on an audio ca ssette) Businesses usually keep 3 generations of back ups. They inspect these Grandfather, father and son. erst a back up is performed, the gramps tape can be re-used.

SECURITY OF DATA in that location are various ways of preventing unauthorised admittance to information stored on a computer, for spokesperson: User names Passwords (network, local anesthetic or file) o Never fall in your password. vary it at least once a fortnight. close the bite of log-in attempts Access Rights o Users can only access specific files or areas of the network discourse only files Audit trails o Management can behold who accessed the network, when, for ! how long and what files were opened Regular house-keeping o Delete files no thirster required, empty recycle bin, temporary internet files, send and deleted items folders in email (also saves on use of memory) Log finish off or lock the computer when leaving desk Restrict access to the elbow room where the computer is situated CONFIDENTIAL write up BASED...If you want to get a full essay, order it on our website:
OrderEssay.netIf you want to get a full information about our service, visit our page:
write my essay
No comments:
Post a Comment