Protecting ICT Systems: Theory
|Specification Reference||Specification Point|
|3.1.7.d||explain methods for combatting ICT crime and protecting ICT systems: physical security, firewalls, backup, encryption, biometric security, software patches/updates, anti-virus and anti-spyware software, access rights, auditing, education of users, user IDs, passwords and methods for ensuring passwords remain effective|
This mini website covers the specification points above.
Students should read through the information and make their own notes.
There are some suggestions for tasks in the 'Lesson Ideas' section which could be used to accompany the website.