48
Ensuring Computer & Data Security Ensuring Computer & Data Security

Ensuring Computer & Data Security. Information Where there is an interactive task within the programme it cannot be completed on- screen. It is suggested

Embed Size (px)

Citation preview

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Information

Where there is an interactive task within the programme it cannot be completed

on- screen. It is suggested that a printed copy be made.

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Ensuring Computer & Data Security

Correct

Ensuring Computer & Data Security

Correct

Ensuring Computer & Data Security

Correct

Ensuring Computer & Data Security

Correct

Ensuring Computer & Data Security

Correct

Ensuring Computer & Data Security

Answers

1. All hardware, data and software

2. Collapse the packaging and content details

3. To prevent unauthorised access to the computers systems

4. Destroy vital data

5. In the event of computer failure

Ensuring Computer & Data Security

Copyright

The contents and interests of the programmes are the copyright of Training Exchange Services and must only be used for the purpose of presentations.

The contents must not, without the express permission of Training Exchange Services, be re-sold ,sub-licenced or loaned in the form supplied (other than printed material).

The presentation material must only be used by the named purchaser as part of his/her business activities.

The contents can be printed and re-produced as and when required, however copyright remains with Training Exchange Services.

Legal Action will be taken immediately against an organisation in breach of copyright.

Training Exchange Services

74 Victoria Crescent Road

Glasgow G12 9JN

Tel: 0141-334 6122 Fax: 0141 337 5050

E-mail: [email protected]

Website: www.trainexe.com