Levels of Permitted Access - Certain users would have different/restricted access to certain data or parts of the system, Write Protect Mechanisms - Only certain users will have permission to write/edit data already stored on the system. (e.g. in school we have different network areas with restricted access, pupils can access files on p:drive but not edit the files)., Strong Secure Password - The organisation limits access to the network by ensuring that all authorised users have a strong secure password. (e.g. at least 8 characters with a letter, number and a symbol)., Access rights - Access to confidential files on the network is limited to authorised users only by assigning access rights to users that only allow certain users to access specified area of the network and/or specified files., Encryption - Hackers are prevented from reading the confidential files even if they gain access to it by encrypting the files. An encryption key is used and known only by the organisation, Firewall - The servers would be protected with firewall software blocking / checking all network traffic entering or leaving specified ports / stop programs accessing the internet, Antivirus Software - File servers would be protected with antivirus software which regularly scans all files stored on them for possible infection by malware, Backups - Copies of data held in order to restore in the event of data loss, Antivirus Software - Email server would be protected with antivirus software and all incoming emails would be scanned to see if attached files are infected, Policies / Legislation - Relevant descriptions based on current legislation or company policies. Standard clerical procedures e.g. ensuring all employees have signed and agreed to the ICT Code of Conduct and have signed that they will follow the rules set out in the Acceptable Network Use Policy., Accounting or auditing software - All files accessed by a user are recorded in an activity log, Antivirus software - Workstations would be protected with antivirus software and all files from external media would be scanned before they’re allowed to be accessed,

Protecting the security and integrity of data

Leaderboard

Visual style

Options

Switch template

Continue editing: ?