1Revision_Information Security

  • docx
  • 10.05.2020
Публикация на сайте для учителей

Публикация педагогических разработок

Бесплатное участие. Свидетельство автора сразу.
Мгновенные 10 документов в портфолио.

Иконка файла материала 1Revision_Information Security.docx

Tasks

 

Name of group____________________      

                                                                      

1.      What dangers can arise when transporting information over computer networks?

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

 

2.      What methods do you know to identify a person when providing access to information?

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

 

3.      What software and hardware ways do you know to protect the information?

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

 

4.      In which situations there is a leak or loss of data?

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

 

5.      Which data protection measures can be used for data integrity and confidentiality, including backup, encryption, and mirroring?

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

_____________________________________________________________________________

 

 

 

Name of group____________________

 

 

1.      What are the 3 types of identification?

_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________

 

2.      What is the most secure type?

_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________

 

3.      Why is it the most secure?

_________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Name of group____________________

 

Information security -_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Confidentiality -

_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Integrity -_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________

Accessibility -_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________