IT Security Protocols (LO1) Flashcards
(6 cards)
What should IT Security protocols cover?
*Unauthorised used
*Inappropriate use
What are ways to prevent unauthorised access from having access to certain info?
*Software tools - e.g. antivirus, firewall and spyware
*Password protection - e.g. networks, computers and docs
*Access rights - e.g. internal stakeholders like staff can only have access to files
*Screen location - Prevent screen contents from being visible
*Screensavers - Requiring passwords for unattended computers
What is one way of inappropriate use of IT resources?
Non-work related activity e.g. social media
What is a second way of inappropriate use of IT resources?
Installing unauthorised software e.g. games
What is another way of inappropriate use of IT resources?
Misuse of equipment or software licenses
What are the negative impacts of inappropriate use of IT resources?
*Fines e.g. misuse of data
*Wasted staff time
*Increased business costs e.g. replacing damaged equipment