i). Enforce data & information access control policies on all employees to control access to data.
ii). Keep the computer room closed when nobody is using it.
iii). Reinforce weak access points, e.g., doors & windows with metallic grills and burglar alarms.
iv). Use file passwords to prevent any person from getting access to the electronic files.
v). Enforce network security measures, e.g., use of firewalls.
vi). Encrypt the data & information during transmission.
vii). Perform frequent Audit trails to identify threats to data & information.
Kavungya answered the question on April 24, 2019 at 13:43
- List the facilities that can ensure proper ventilation in a computer room(Solved)
List the facilities that can ensure proper ventilation in a computer room
Date posted: April 24, 2019. Answers (1)
- Explain the dust control process in a computer laboratory.(Solved)
Explain the dust control process in a computer laboratory.
Date posted: April 24, 2019. Answers (1)
- Explain the dump control process in a computer laboratory(Solved)
Explain the dump control process in a computer laboratory.
Date posted: April 24, 2019. Answers (1)
- Give the precautions necessary when handling of materials and equipment in a computer laboratory(Solved)
Give the precautions necessary when handling of materials and equipment in a computer laboratory
Date posted: April 24, 2019. Answers (1)
- Explain the considerations for standard furniture and posture in a computer laboratory(Solved)
Explain the considerations for standard furniture and posture in a computer laboratory.
Date posted: April 24, 2019. Answers (1)
- Outline the laboratory layout.(Solved)
Outline the laboratory layout.
Date posted: April 24, 2019. Answers (1)
- Explain how special care should be given to your vision.(Solved)
Explain how special care should be given to your vision.
Date posted: April 24, 2019. Answers (1)
- Write the following acronyms in full.
i) BIOS
ii) POST (Solved)
Write the following acronyms in full.
i) BIOS
ii) POST
Date posted: April 24, 2019. Answers (1)
- Give the proper shut down procedure required before switching off the computer.(Solved)
Give the proper shut down procedure required before switching off the computer.
Date posted: April 24, 2019. Answers (1)
- Explain the cursor positioning keys.(Solved)
Explain the cursor positioning keys.
Date posted: April 24, 2019. Answers (1)
- What is the work of a control key?(Solved)
What is the work of a control key?
Date posted: April 24, 2019. Answers (1)
- What is the work of escape Key in a computer keyboard?(Solved)
What is the work of escape Key in a computer keyboard?
Date posted: April 24, 2019. Answers (1)
- List the typing rules to observe when using a keyboard.(Solved)
List the typing rules to observe when using a keyboard.
Date posted: April 24, 2019. Answers (1)
- Give the rules to observe when using a mouse.(Solved)
Give the rules to observe when using a mouse.
Date posted: April 24, 2019. Answers (1)
- Explain the procedure of drag and drop.(Solved)
Explain the procedure of drag and drop.
Date posted: April 24, 2019. Answers (1)
- List the examples of secondary storage devices.(Solved)
List the examples of secondary storage devices.
Date posted: April 24, 2019. Answers (1)
- Differentiate between preemptive and non-preemptive scheduling policies(Solved)
Differentiate between preemptive and non-preemptive scheduling policies
Date posted: April 23, 2019. Answers (1)
- List and explain three process scheduling algorithms(Solved)
List and explain three process scheduling algorithms.
Date posted: April 23, 2019. Answers (1)
- List and explain various ways to overcome deadlocks(Solved)
List and explain various ways to overcome deadlocks.
Date posted: April 23, 2019. Answers (1)
- Explain 4 approaches that can be employed to recover from deadlocks.(Solved)
Explain 4 approaches that can be employed to recover from deadlocks.
Date posted: April 23, 2019. Answers (1)