7. Logical methods

The next few pages look at the different 'logical' methods that can be used to ensure the security of ICT systems and data.

Logical in this case means computer-based methods that can be put in place by the network or system administrator.

They include:

  • backups
  • firewalls
  • encryption
  • software patches/updates
  • anti-virus and anti-spyware software
  • access rights
  • auditing
  • user IDs and passwords

challenge see if you can find out one extra fact on this topic that we haven't already told you

Click on this link: Computer based security