Well done on completing the work, tasks and videos on the Oakes Future page. This really shows your commitment to the course and we are excited to be working with you more in September. This next page will be updated with different tasks to help develop your skills more. It gives you the opportunity to delve into content from the course and get you ready to start in the new term. Feel free to contact us if you have any questions but use this page to strengthen your knowledge and interest in IT.
Cambridge Technicals IT
Threats to computer systems are prevalent. We need to be aware of them especially as we rely heavily on Computers to access information and for our everyday lives. You need to know about the different types of threats which exist and methods of security which can be used to protect your data from those threats.
The following are threats to data on electronic devices. What are the definitions?
Physical security
The following are ways to keep data safe on electronic devices. What are the descriptions?
Logical Security
The following are ways to keep data safe on electronic devices. What are the definitions?
Now you have looked at the threats and security methods can you list the security methods which can be used to combat the threats? There may be more than one method for each threat. Then justify your choices.