Tasks
Name of group____________________
1. What dangers can arise when transporting information over computer networks?
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
2. What methods do you know to identify a person when providing access to information?
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
3. What software and hardware ways do you know to protect the information?
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
4. In which situations there is a leak or loss of data?
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
5. Which data protection measures can be used for data integrity and confidentiality, including backup, encryption, and mirroring?
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
_____________________________________________________________________________
Name of group____________________
1. What are the 3 types of identification?
_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________
2. What is the most secure type?
_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________
3. Why is it the most secure?
_________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Name of group____________________
Information security -_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Confidentiality -
_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Integrity -_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Accessibility -_______________________________________________________________________________________________________________________________________________________________________________________________________________________________________
Материалы на данной страницы взяты из открытых источников либо размещены пользователем в соответствии с договором-офертой сайта. Вы можете сообщить о нарушении.