Loading...
Back to Unit

Data security

Unit: Information Communication Technology

Premium Topic Resources

Sign in to download the full Topic PDF and enable offline revision mode.

Login to Access
Join the community! 550+ students upgraded in the last 24 hours. Limited Discount Seats Available

April 2023

5 Questions
Question 1b
​ ​​Explain ways of protecting yourself from identity theft.


Answers and Explanations are locked.

Login to View Answer
Question 2a
​ ​​(i) Explain reasons why most threats to an organisation’s information system are contributed by insiders.

(ii) State ways of preparing against insider threats


Answers and Explanations are locked.

Login to View Answer
Question 3c
​​​​​Bidii Company has established that its information is being electronically eavesdropped through their servers. 

Outline FOUR measures that the company could put in place to minimise this crime.


Answers and Explanations are locked.

Login to View Answer
Question 4c
​​ (i) Explain basic control measures that organisations could take to improve security on personal devices that employees connect to an organisation’s network.

(ii) Describe Bring Your Own Device (BYOD) security best practices in an organisation


Answers and Explanations are locked.

Login to View Answer
Question 6c
​​Evaluate restoration procedures that could be used to recover lost data


Answers and Explanations are locked.

Login to View Answer

December 2022

1 Questions
Question 4e
​​Assess ways in which general ICT controls ensure the reliability of data generated information systems.


Answers and Explanations are locked.

Login to View Answer