question archive COMP 383 - Lab - Threat identification to ICT Systems Answer the questions using your own words: Task 1:  Identify and describe the consequences of five common physical threats to ICT systems and data including hardware damage, loss and theft

COMP 383 - Lab - Threat identification to ICT Systems Answer the questions using your own words: Task 1:  Identify and describe the consequences of five common physical threats to ICT systems and data including hardware damage, loss and theft

Subject:Computer SciencePrice: Bought3

COMP 383 - Lab - Threat identification to ICT Systems

Answer the questions using your own words:

Task 1:  Identify and describe the consequences of five common physical threats to ICT systems and data including hardware damage, loss and theft. (You must include at least Two of each of the following below)

  • Deliberate damage to hardware or equipment
  • Inadequate physical security
  • Loss or theft due to size or portability of devices
  • Accidental damage to hardware or equipment.

Identify

Describe the consequences

Identify

Describe the consequences

Identify

Describe the consequences

Identify

Describe the consequences

Identify

Describe the consequences

Task 2 : Identify and describe the consequences of the following types of malicious code:

Identify- Virus

Describe the consequences

Identify - Malware

Describe the consequences

Identify - Spyware

Describe the consequences

Identify - Adware

Describe the consequences

Identify - Trojan ~Horse

Describe the consequences

Identify - Logic Bomb

Describe the consequences

Identify - Worm

Describe the consequences

Identify - Rootkits

Describe the consequences

Identify - Keylogger

Describe the consequences

Task  3: Explain five security vulnerabilities associated with remote access technologies, including wireless.

Task 4: Describe the methods of providing physical access control and security for ICT systems including:

locks (hardware locks and entry locks)

Biometric controls (fingerprint, voice and retina recognition)

CCTV

Fire control systems

Shielding (cable screening)

Faraday Cage

Motion detector

Task 5: Describe methods of providing electronic protection and security controls for any five of the following:

  • firewalls
  • virtual networks
  • secure connection/transfer protocols
  • wireless connection security
  • login and password protection
  • access rights and permissions (including limiting data access)
  • virus, malware and spyware protection
  • secure remote access
  • backup and restore systems
  • monitoring systems (activity logging, access logs and audit logs).

Task 6: Describe the characteristics of strong passwords

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Related Questions