The Defense Strategies can be implemented either as application controls or general controls. Some are intended to protect against human errors or others protect against natural causes. General controls are established to protect the system regardless of the specific application e.g. protecting hardware and controlling access to a computer centre. Application controls as safeguards that are intended to protect specific applications, major categories of general controls include physical controls, access controls, data security controls, network controls and administrative controls.
The Physical Controls refer to protection of computer facilities and resources which include computers, data centers, software manuals and networks. Physical controls protect against most natural hazards and subhuman hazards and are commonly referred to as the first line in defense.
They include the following:
- Appropriate design of a computer centre so that it is fireproof and waterproof
- Shielding against electromagnetic fields
- Good fire prevention, detection and extinguishing system
- Emergency power shut off and backup batteries
- Properly designed maintained and operated air conditioning system
- Motion detector alarms that detect physical intrusion
Kavungya answered the question on May 10, 2019 at 13:12
- Explain the defense strategies implemented for computer crimes.(Solved)
Explain the defense strategies implemented for computer crimes.
Date posted: May 10, 2019. Answers (1)
- Describe intentional threats.(Solved)
Describe intentional threats.
Date posted: May 10, 2019. Answers (1)
- Describe Unintentional threats.(Solved)
Describe Unintentional threats.
Date posted: May 10, 2019. Answers (1)
- Describe computer systems Vulnerability.(Solved)
Describe computer systems Vulnerability.
Date posted: May 10, 2019. Answers (1)
- Describe the database availability.(Solved)
Describe the database availability.
Date posted: May 10, 2019. Answers (1)
- Describe the database management systems security features.(Solved)
Describe the database management systems security features.
Date posted: May 10, 2019. Answers (1)
- Outline the database security issues.(Solved)
Outline the database security issues.
Date posted: May 10, 2019. Answers (1)
- Describe database security.(Solved)
Describe database security.
Date posted: May 10, 2019. Answers (1)
- State and explain the contents of a database.(Solved)
State and explain the contents of a database.
Date posted: May 10, 2019. Answers (1)
- Explain the disadvantages of database approach.(Solved)
Explain the disadvantages of database approach.
Date posted: May 10, 2019. Answers (1)
- State and explain the features that characterize a database approach.(Solved)
State and explain the features that characterize a database approach.
Date posted: May 10, 2019. Answers (1)
- State and explain the Limitations of a file system.(Solved)
State and explain the Limitations of a file system.
Date posted: May 10, 2019. Answers (1)
- Describe file systems.(Solved)
Describe file systems.
Date posted: May 10, 2019. Answers (1)
- Describe data warehousing.(Solved)
Describe data warehousing.
Date posted: May 10, 2019. Answers (1)
- Describe data mining.(Solved)
Describe data mining.
Date posted: May 10, 2019. Answers (1)
- Give the problems with IT planning.(Solved)
Give the problems with IT planning.
Date posted: May 10, 2019. Answers (1)
- Describe the completion of projects on time and within budgets.(Solved)
Describe the completion of projects on time and within budgets.
Date posted: May 10, 2019. Answers (1)
- Describe the allocation of resources in IT.(Solved)
Describe the allocation of resources in IT.
Date posted: May 10, 2019. Answers (1)
- Describe the design of information technology architecture.(Solved)
Describe the design of information technology architecture.
Date posted: May 10, 2019. Answers (1)
- Describe the alignment of the IT plan with the organization plan.(Solved)
Describe the alignment of the IT plan with the organization plan.
Date posted: May 10, 2019. Answers (1)