Strong Secure Password - The organisation limits access to the network by ensuring that all authorised users have this (e.g. at least 8 characters with a letter, number and a symbol)., Permission levels - Certain users would have different/restricted access to certain data or parts of the system., Read and Write Protection - Enabling some people to be able to edit files or only see the contents of the file., Encryption - Hackers are prevented from reading the confidential files even if they gain access to it by scrambling the data., Firewall - The servers would be protected with software blocking / checking all network traffic., Antivirus Software - File servers would be protected from malware using this., Backups - Copies of data held in order to restore in the event of data loss., Secure room access - Making the place where the computers/servers are protected with locked doors operated via a PIN or keycard., Lock the computer - What you should do to a device when you leave it unattended., Fireproof safe - You could store backups in here to prevent damage from natural disasters.,

BTEC IT Level 3 Protecting the integrity of data

Leaderboard

Visual style

Options

Switch template

Continue editing: ?