term1 Definition1term2 Definition2term3 Definition3
Please sign in to your Google account to access your documents:
define Call back procedures
User logs onto a computer which immediately
disconnects the line then dials the user back which avoids the user logging in with someone else s details.
define Firewalls
A dedicated gateway machine with special security precautions on it to monitor a network especially those against hackers through the internet.
define Data integrity
Integrity is ensured by:
Parity: A bit added onto the end of a byte making all bytes transmitted EVEN, if it recived and is odd, the data is corrupt and will not be used.
Checksum: All the bits transmitted are added and the value is known as the check-sum, if the value received equates to less than this then data has been corrupted
Cyclic Redundancy Check: Like the checksum
define possible disasters
.Fire, Floods, hurricanes
.Hardware failure
.Software failure
.deliberate vandalism
.accidents
.network failure
define the steps taking towards disaster planning
[BEFORE]
.risk analysis
.preventative measures
.staff training
[DURING]
.what response staff should make to disaster
[AFTER]
.Recovery measures
Hardware-Easily (expensive) replaced
Software-Can be reinstalled, Data is the most important variable to protect and the hardest to retrieve
Backups-VERY IMPORTANT TO BACK ALL DATA, TAKES A LONG TIME
Need help typing ? See our FAQ (opens in new window)
Please sign in to create this set. We'll bring you back here when you are done.
Discard Changes Sign in
Please sign in to add to folders.
Sign in
Don't have an account? Sign Up »
You have created 2 folders. Please upgrade to Cram Premium to create hundreds of folders!