Computer hardware and software bottom of the inning be damaged and lost by:
chevvy
Flood
Powercut
Power surge
Theft
This damage/ liberation can be prevented in the following slipway:
Fire/flood proof safe to store affirm up turns
Fire/burglar alarms
Keeping equipment above ground (flood)
electronic guards or Spikes (power surges)
Generator (power cut)
Regularly saving your work
Locks}
Cameras} Theft
Security score}
Bolt down equipment}
It is vital to regularly take back ups of files in case the originals are lost or damaged. In a business this would be done every night.
At home this could be by saving files onto Floppy disk or CDs
Businesses normally use magnetic tape or tape streamers. These can store massive amounts of information, but it is more difficult to find specific files (like on an audio cassette)
Businesses usually keep 3 generations of back ups. They call these Grandfather, father and son. erst a back up is performed, the grandfather tape can be re-used.
SECURITY OF DATA
There are various ways of preventing unauthorised access to information stored on a computer, for spokesperson:
User names
Passwords (network, local or file)
o Never fall in your password. Change it at least once a fortnight.
close the number of log-in attempts
Access Rights
o Users can only access specific files or areas of the network
pronounce only files
Audit trails
o Management can descry who accessed the network, when, for how long and what files were opened
Regular house-keeping
o Delete files no thirster required, empty recycle bin, temporary internet files, sent and deleted items folders in email (also saves on use of memory)
Log off or lock the computer when leaving desk
Restrict access to the elbow room where the computer is situated
CONFIDENTIAL PAPER BASED...If you want to get a full essay, order it on our website: Orderessay
If you want to get a full essay, wisit our page: write my essay .
No comments:
Post a Comment