(a) Log files: These are special files that keep a record (log) of events on the use of computers and resources of the information system.
(b) Firewalls: A firewall is a program or hardware that filters data and information coming from the internet to your computer or between networks.
Firewall can prevent spam or filter downloaded contents.
(c) Audit trails: An audit trail ( or audit log) is a security-relevant chronological record, set of records, or destination and source of records that provide documentary evidence of the sequence of activities that have affected at any time a specific operation, procedure, or event. Audit trails help to detect trespassing and alterations. For example, CAAT( Computer Aided Audit Trail Software).
(d) Data encryption: Refers to the process of mixing (encoding/ encrypt) data in form that only the sender and the receiver understands. Data encryption is a useful tool against tapping.
maurice.mutuku answered the question on April 17, 2018 at 05:55
- Give six reasons for using computer based advertising in an organisation(Solved)
Give six reasons for using computer based advertising in an organisation.
Date posted: April 16, 2018. Answers (1)
- What are the examples of computer crimes?(Solved)
List and explain briefly examples of computer crimes.
Date posted: April 16, 2018. Answers (1)
- Define the term computer software(Solved)
Define the term computer software.
Date posted: April 16, 2018. Answers (1)
- How can theft lead to loss of data in a computer systems and what control measures can be put in place to curb this problem?(Solved)
Explain how theft can lead to loss of data in a computer systems and what control measures can be put in place to curb this problem.
Date posted: April 16, 2018. Answers (1)
- How can natural calamities lead to loss of data in a computer systems and what control measures can be put in place to curb this...(Solved)
Explain how natural calamities can lead to loss of data in a computer systems and what control measures can be put in place to curb this problem.
Date posted: April 16, 2018. Answers (1)
- How can computer hardware and software faults be seen as a threat to computer systems and what control measures can be enforced to curb this...(Solved)
Explain how computer hardware and software faults can be seen as a threat to computer systems. Also give the control measure(s) that can be enforced to curb this problem.
Date posted: April 14, 2018. Answers (1)
- How can unauthorized access lead to a threat to computer systems and what control measure can be put in place to curb this vice?(Solved)
Discuss how unauthorized access can lead to a threat to computer systems and what control measure can be put in place to curb this vice.
Date posted: April 14, 2018. Answers (1)
- How can you prevent viruses from attacking your computer?(Solved)
Give ways of preventing viruses from attacking your computer.
Date posted: April 14, 2018. Answers (1)
- In what ways do viruses spread from one computer to another?(Solved)
Give ways in which viruses spread from one computer to another.
Date posted: April 14, 2018. Answers (1)
- What are the symptoms of a computer infected by viruses?(Solved)
List the symptoms of a computer infected by viruses.
Date posted: April 14, 2018. Answers (1)
- What are the types of computer viruses?(Solved)
Highlight the types of computer viruses.
Date posted: April 14, 2018. Answers (1)
- What are the common properties of computer viruses?(Solved)
Discuss the common properties of computer viruses.
Date posted: April 14, 2018. Answers (1)
- What is a computer virus?(Solved)
Define computer virus.
Date posted: April 14, 2018. Answers (1)
- What are the main security threats to data?(Solved)
Highlight the main security threats to data.
Date posted: April 14, 2018. Answers (1)
- What is confidential data?(Solved)
Define confidential data.
Date posted: April 14, 2018. Answers (1)
- What is private data?(Solved)
Define private data.
Date posted: April 14, 2018. Answers (1)
- What is data security?(Solved)
Define data security.
Date posted: April 14, 2018. Answers (1)
- What is data privacy?(Solved)
Define data privacy.
Date posted: April 14, 2018. Answers (1)
- Which procedure would you use in accessing a research topic notes from the Internet?(Solved)
Describe the procedure you would use in accessing a research topic notes from the Internet.
Date posted: April 14, 2018. Answers (1)
- What are the qualities of good e-mail contact management software?(Solved)
Give the qualities of good e-mail contact management software.
Date posted: April 14, 2018. Answers (1)