2.1.5: IT Security Protocols

Cards (5)

  • What are some examples of how businesses protect themselves from unauthorised access to sensitive information?
  • IT security protocols should cover unauthorised and inappropriate use
  • Businesses can prevent unauthorised use of IT resources through:
    • Software tools; anti-virus, firewall and spyware
    • Password protection
    • Access rights; limited to selected staff
    • Screensavers for unattended computers
    • Screen location; prevent screen contents being visible
  • Inappropriate use of IT resources can be through non-work related activity, misuse of equipment and software licenses, damage to IT resources and installing unauthorised software.
  • Inappropriate use of IT resources can result in:
    • Wasted staff time
    • Fines for misuse of data and licenses
    • Increased business costs due to replacing damaged equipment.