IT Security Protocols (LO1) Flashcards

(6 cards)

1
Q

What should IT Security protocols cover?

A

*Unauthorised used
*Inappropriate use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are ways to prevent unauthorised access from having access to certain info?

A

*Software tools - e.g. antivirus, firewall and spyware
*Password protection - e.g. networks, computers and docs
*Access rights - e.g. internal stakeholders like staff can only have access to files
*Screen location - Prevent screen contents from being visible
*Screensavers - Requiring passwords for unattended computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is one way of inappropriate use of IT resources?

A

Non-work related activity e.g. social media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is a second way of inappropriate use of IT resources?

A

Installing unauthorised software e.g. games

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is another way of inappropriate use of IT resources?

A

Misuse of equipment or software licenses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the negative impacts of inappropriate use of IT resources?

A

*Fines e.g. misuse of data
*Wasted staff time
*Increased business costs e.g. replacing damaged equipment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly