- Prevent access by using locks, smart card or password
- Prevent portability by restricting the hardware from being moved
- Detect and guard all exits and record any hardware transported.
Kavungya answered the question on May 10, 2019 at 14:00
- Explain three ways to protect computer from human aspect threat.(Solved)
Explain three ways to protect computer from human aspect threat.
Date posted: May 10, 2019. Answers (1)
- Describe the natural disaster Vs data backup.(Solved)
Describe the natural disaster Vs data backup.
Date posted: May 10, 2019. Answers (1)
- Define firewall.(Solved)
Define firewall.
Date posted: May 10, 2019. Answers (1)
- Define Anti spyware.(Solved)
Define Anti spyware.
Date posted: May 10, 2019. Answers (1)
- Describe Antivirus.(Solved)
Describe Antivirus.
Date posted: May 10, 2019. Answers (1)
- Define Cryptography.(Solved)
Define Cryptography.
Date posted: May 10, 2019. Answers (1)
- Describe the natural and environmental threats.(Solved)
Describe the natural and environmental threats.
Date posted: May 10, 2019. Answers (1)
- Describe the application controls.(Solved)
Describe the application controls.
Date posted: May 10, 2019. Answers (1)
- Describe the administration controls.(Solved)
Describe the administration controls.
Date posted: May 10, 2019. Answers (1)
- Describe the communication controls.(Solved)
Describe the communication controls.
Date posted: May 10, 2019. Answers (1)
- Describe the data security controls.(Solved)
Describe the data security controls.
Date posted: May 10, 2019. Answers (1)
- Describe the Access control.(Solved)
Describe the Access control.
Date posted: May 10, 2019. Answers (1)
- Describe the general computer controls.(Solved)
Describe the general computer controls.
Date posted: May 10, 2019. Answers (1)
- Explain the defense strategies implemented for computer crimes.(Solved)
Explain the defense strategies implemented for computer crimes.
Date posted: May 10, 2019. Answers (1)
- Describe intentional threats.(Solved)
Describe intentional threats.
Date posted: May 10, 2019. Answers (1)
- Describe Unintentional threats.(Solved)
Describe Unintentional threats.
Date posted: May 10, 2019. Answers (1)
- Describe computer systems Vulnerability.(Solved)
Describe computer systems Vulnerability.
Date posted: May 10, 2019. Answers (1)
- Describe the database availability.(Solved)
Describe the database availability.
Date posted: May 10, 2019. Answers (1)
- Describe the database management systems security features.(Solved)
Describe the database management systems security features.
Date posted: May 10, 2019. Answers (1)
- Outline the database security issues.(Solved)
Outline the database security issues.
Date posted: May 10, 2019. Answers (1)