Detail the types of problems associated with microcomputer security and the types of countermeasures that could be installed against loss.
What will be an ideal response?
The data a PC holds may be considerably more valuable than the machine itself. We are
concerned here with both data security and physical security. Some obvious precautions that
concern the data. For example, careful storage of the media, regular backups taken that are labeled
and classified if appropriate. Working procedures should be appropriately defined. Obvious
physical security such as fixing the machine to a surface, using locks and/or alarming it. Other
measures include using security programs, careful disposal of old media and equipment, staff
training.
You might also like to view...
All of the following are buttons that can be used to add contacts or create groups, EXCEPT _____.
A.
B.
C.
D.
Characteristic of a field that determines how it looks and behaves.
What will be an ideal response?