The document outlines problems with data security and procedures to address them. It identifies risks like data loss, unauthorized access, and viruses. It then describes controls such as using passwords, encryption, access logs, backups, and updated antivirus software to protect the data and limit access. Network transmission issues are also discussed, along with error checking methods to address them.
The document outlines problems with data security and procedures to address them. It identifies risks like data loss, unauthorized access, and viruses. It then describes controls such as using passwords, encryption, access logs, backups, and updated antivirus software to protect the data and limit access. Network transmission issues are also discussed, along with error checking methods to address them.
The document outlines problems with data security and procedures to address them. It identifies risks like data loss, unauthorized access, and viruses. It then describes controls such as using passwords, encryption, access logs, backups, and updated antivirus software to protect the data and limit access. Network transmission issues are also discussed, along with error checking methods to address them.
The document outlines problems with data security and procedures to address them. It identifies risks like data loss, unauthorized access, and viruses. It then describes controls such as using passwords, encryption, access logs, backups, and updated antivirus software to protect the data and limit access. Network transmission issues are also discussed, along with error checking methods to address them.
Download as PPTX, PDF, TXT or read online from Scribd
Download as pptx, pdf, or txt
You are on page 1/ 6
Group 2
Problem Identification and Explanation
1. Data loss and destruction
2. Minimal security to data and its vulnerability to unauthorized access
Control Procedure and Explanation
- Use of a password as means of verifying a user's identity before access - Equipped it with security features such as Authentication devices and Encryption - Limit access to authorized person - Use of cameras and access log wherein details about visitors access can be obtained - Provide a back up computer facility in case of disasters in order to protect and retrieve data. - Maintain an audit logs for purposes of audit trail. Problem Identification and Explanation
3. Risk of Virus Infection
4. Penetration & Manipulation of data and Malfunction of system (illegal access both internally and from the internet)
Control Procedure and Explanation
-install a effective antivirus software and keep it up to date
-acquire a software firewall -Use of digital signature -Use of request response technique -Use of message sequence numbering -Use of private key encryption Problem Identification and Explanation