Bpp learning Media is an acca approved Content Provider



Download 5,67 Mb.
Pdf ko'rish
bet358/727
Sana05.04.2022
Hajmi5,67 Mb.
#530463
1   ...   354   355   356   357   358   359   360   361   ...   727
Bog'liq
F1 BPP ST(August 2020) [Unlocked by www.freemypdf.com] (1)

 
257 
A further risk, depending on the type of network configuration, is that an extra PC could be 'plugged in' 
to the network to gain access to it. The 
network management software 
should detect and prevent 
breaches of this type. 
6.2.11 Systems integrity with a WAN 
Additional issues over and above those already described are related to the extensive communications 
links utilised by Wide Area Networks. Dedicated land lines for data transfer and encryption software may 
be required. 
If 
commercially sensitive data 
is being transferred it would be necessary to specify high quality 
communications equipment and to use sophisticated network software to prevent and detect any 
security breaches.
6.3 Contingency controls 

contingency
 
is an unscheduled interruption of computing services that requires measures outside the 
day-to-day routine operating procedures. 
The preparation of a contingency plan (also known as a disaster recovery plan) is one of the stages in 
the development of an organisation-wide security policy. A contingency plan is necessary in case of a 
major 
disaster
,
 
or if some of the 
security measures 
discussed elsewhere 
fail


disaster 
occurs where the system for some reason breaks down, leading to potential 
losses 
of 
equipment, data or funds. The system 
must recover as soon as possible 
so that further losses are not 
incurred, and current losses can be rectified.
QUESTION 
Causes of system breakdown
 
What actions or events might lead to a system breakdown? 
ANSWER 
System breakdowns can occur in a variety of circumstances, for example:
(a) 
Fire destroying data files and equipment 
(b) Flooding 
(c) 
A cyber-attack completely destroying a data or program file 
(d) 
A technical fault in the equipment 
(e) 
Accidental destruction of telecommunications links (eg builders severing a cable) 
(f) Terrorist 
attack 
(g) 
System failure caused by software bugs which were not discovered at the design stage 
(h) 
Internal sabotage (eg logic bombs built into the software) 

Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   354   355   356   357   358   359   360   361   ...   727




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish