(a) Log files: These are special files that keep a record (log) of events on the use of computers and resources of the information system.
(b) Firewalls: A firewall is a program or hardware that filters data and information coming from the internet to your computer or between networks.
Firewall can prevent spam or filter downloaded contents.
(c) Audit trails: An audit trail ( or audit log) is a security-relevant chronological record, set of records, or destination and source of records that provide documentary evidence of the sequence of activities that have affected at any time a specific operation, procedure, or event. Audit trails help to detect trespassing and alterations. For example, CAAT( Computer Aided Audit Trail Software).
(d) Data encryption: Refers to the process of mixing (encoding/ encrypt) data in form that only the sender and the receiver understands. Data encryption is a useful tool against tapping.
maurice.mutuku answered the question on April 17, 2018 at 05:55
-
Give six reasons for using computer based advertising in an organisation
(Solved)
Give six reasons for using computer based advertising in an organisation.
Date posted:
April 16, 2018
.
Answers (1)
-
What are the examples of computer crimes?
(Solved)
List and explain briefly examples of computer crimes.
Date posted:
April 16, 2018
.
Answers (1)
-
Define the term computer software
(Solved)
Define the term computer software.
Date posted:
April 16, 2018
.
Answers (1)
-
How can theft lead to loss of data in a computer systems and what control measures can be put in place to curb this problem?
(Solved)
Explain how theft can lead to loss of data in a computer systems and what control measures can be put in place to curb this problem.
Date posted:
April 16, 2018
.
Answers (1)
-
How can natural calamities lead to loss of data in a computer systems and what control measures can be put in place to curb this...
(Solved)
Explain how natural calamities can lead to loss of data in a computer systems and what control measures can be put in place to curb this problem.
Date posted:
April 16, 2018
.
Answers (1)
-
How can computer hardware and software faults be seen as a threat to computer systems and what control measures can be enforced to curb this...
(Solved)
Explain how computer hardware and software faults can be seen as a threat to computer systems. Also give the control measure(s) that can be enforced to curb this problem.
Date posted:
April 14, 2018
.
Answers (1)
-
How can unauthorized access lead to a threat to computer systems and what control measure can be put in place to curb this vice?
(Solved)
Discuss how unauthorized access can lead to a threat to computer systems and what control measure can be put in place to curb this vice.
Date posted:
April 14, 2018
.
Answers (1)
-
How can you prevent viruses from attacking your computer?
(Solved)
Give ways of preventing viruses from attacking your computer.
Date posted:
April 14, 2018
.
Answers (1)
-
In what ways do viruses spread from one computer to another?
(Solved)
Give ways in which viruses spread from one computer to another.
Date posted:
April 14, 2018
.
Answers (1)
-
What are the symptoms of a computer infected by viruses?
(Solved)
List the symptoms of a computer infected by viruses.
Date posted:
April 14, 2018
.
Answers (1)
-
What are the types of computer viruses?
(Solved)
Highlight the types of computer viruses.
Date posted:
April 14, 2018
.
Answers (1)
-
What are the common properties of computer viruses?
(Solved)
Discuss the common properties of computer viruses.
Date posted:
April 14, 2018
.
Answers (1)
-
What is a computer virus?
(Solved)
Define computer virus.
Date posted:
April 14, 2018
.
Answers (1)
-
What are the main security threats to data?
(Solved)
Highlight the main security threats to data.
Date posted:
April 14, 2018
.
Answers (1)
-
What is confidential data?
(Solved)
Define confidential data.
Date posted:
April 14, 2018
.
Answers (1)
-
What is private data?
(Solved)
Define private data.
Date posted:
April 14, 2018
.
Answers (1)
-
What is data security?
(Solved)
Define data security.
Date posted:
April 14, 2018
.
Answers (1)
-
What is data privacy?
(Solved)
Define data privacy.
Date posted:
April 14, 2018
.
Answers (1)
-
Which procedure would you use in accessing a research topic notes from the Internet?
(Solved)
Describe the procedure you would use in accessing a research topic notes from the Internet.
Date posted:
April 14, 2018
.
Answers (1)
-
What are the qualities of good e-mail contact management software?
(Solved)
Give the qualities of good e-mail contact management software.
Date posted:
April 14, 2018
.
Answers (1)