Download presentation
Presentation is loading. Please wait.
Published byBelinda Sherman Modified over 8 years ago
1
Section 13 Activities
2
Activity 1 Complete the following table with possible reasons why ICT security might be compromised Security BreachPossible reason Unauthorised access to data Impersonating another user Changing functionality of software Link into someone else’s communication link Claim to have either sent data or indeed not sent
3
Activity cont. Describe 2 internal and 2 external threats to the ICT system Describe some of the reasons why individuals or organisations might try to breach security of ICT systems Name 2 type of threat to ICT systems Describe a means of protecting data that is being transferred over a network
4
Activity cont. If the security measures put in place fail to keep external threats at bay, what legislation is in place to prosecute offenders? Describe the measures put in place by the Data Protection Act and describe the effectiveness of the legislation.
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.