question archive COMP 383 - Lab - Threat identification to ICT Systems Answer the questions using your own words: Task 1: Identify and describe the consequences of five common physical threats to ICT systems and data including hardware damage, loss and theft
Subject:Computer SciencePrice: Bought3
COMP 383 - Lab - Threat identification to ICT Systems
Answer the questions using your own words:
Task 1: Identify and describe the consequences of five common physical threats to ICT systems and data including hardware damage, loss and theft. (You must include at least Two of each of the following below)
Identify
Describe the consequences
Identify
Describe the consequences
Identify
Describe the consequences
Identify
Describe the consequences
Identify
Describe the consequences
Task 2 : Identify and describe the consequences of the following types of malicious code:
Identify- Virus
Describe the consequences
Identify - Malware
Describe the consequences
Identify - Spyware
Describe the consequences
Identify - Adware
Describe the consequences
Identify - Trojan ~Horse
Describe the consequences
Identify - Logic Bomb
Describe the consequences
Identify - Worm
Describe the consequences
Identify - Rootkits
Describe the consequences
Identify - Keylogger
Describe the consequences
Task 3: Explain five security vulnerabilities associated with remote access technologies, including wireless.
Task 4: Describe the methods of providing physical access control and security for ICT systems including:
locks (hardware locks and entry locks)
Biometric controls (fingerprint, voice and retina recognition)
CCTV
Fire control systems
Shielding (cable screening)
Faraday Cage
Motion detector
Task 5: Describe methods of providing electronic protection and security controls for any five of the following:
Task 6: Describe the characteristics of strong passwords