- Prevent access by using locks, smart card or password
- Prevent portability by restricting the hardware from being moved
- Detect and guard all exits and record any hardware transported.
Kavungya answered the question on May 10, 2019 at 14:00
-
Explain three ways to protect computer from human aspect threat.
(Solved)
Explain three ways to protect computer from human aspect threat.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe the natural disaster Vs data backup.
(Solved)
Describe the natural disaster Vs data backup.
Date posted:
May 10, 2019
.
Answers (1)
-
Define firewall.
(Solved)
Define firewall.
Date posted:
May 10, 2019
.
Answers (1)
-
Define Anti spyware.
(Solved)
Define Anti spyware.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe Antivirus.
(Solved)
Describe Antivirus.
Date posted:
May 10, 2019
.
Answers (1)
-
Define Cryptography.
(Solved)
Define Cryptography.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe the natural and environmental threats.
(Solved)
Describe the natural and environmental threats.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe the application controls.
(Solved)
Describe the application controls.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe the administration controls.
(Solved)
Describe the administration controls.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe the communication controls.
(Solved)
Describe the communication controls.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe the data security controls.
(Solved)
Describe the data security controls.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe the Access control.
(Solved)
Describe the Access control.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe the general computer controls.
(Solved)
Describe the general computer controls.
Date posted:
May 10, 2019
.
Answers (1)
-
Explain the defense strategies implemented for computer crimes.
(Solved)
Explain the defense strategies implemented for computer crimes.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe intentional threats.
(Solved)
Describe intentional threats.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe Unintentional threats.
(Solved)
Describe Unintentional threats.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe the database availability.
(Solved)
Describe the database availability.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe the database management systems security features.
(Solved)
Describe the database management systems security features.
Date posted:
May 10, 2019
.
Answers (1)
-
Outline the database security issues.
(Solved)
Outline the database security issues.
Date posted:
May 10, 2019
.
Answers (1)
-
Describe database security.
(Solved)
Describe database security.
Date posted:
May 10, 2019
.
Answers (1)