Note that your final mark will not be saved in the system.
Protection GapFill
You must fill all the gaps before clicking ‘Check Answers!’
are the rules and procedures that businesses use in order to protect themselves from malware attacks and data breaches, or to recover from an incident. They help ensure that businesses are compliant with all of the government legislation that they are expected to follow, such as the Data Act.
Staff are only given access to the files and shared folders that they need, by setting file . Each member of staff is for following the company policies required to keep the data secure.
A business must continue operating after a data breach, a system malfunction, or a disaster such as a flood. The plan will range from a simple restore from backups, all the way to moving to a new location if the current building is damaged or destroyed by a flood or a fire. The faster the business is able to recover, the sooner normal work resumes, and less is lost.
Businesses need to assess all of the that could affect the business, and work out how to minimise each. They can be displayed in a grid (sometimes called a matrix), based on the severity of each risk and its likelihood of occurring.
The protection measures should be regularly to ensure that they are effective. For example, a business might employ someone to attempt to break into their system, or check that they can restore from their backups.
All staff must be when they join the company, otherwise they won’t be familiar with the different policies – it is essential for the documents to be active and not to be gathering dust in the filing cabinet. Staff may also require annual refreshers that serve as a reminder.
Protection can be , such as securing doors and equipment with locks, keypads and cards. If the protection includes attributes about us, such as fingerprints or facial recognition, we call these . We can also keep a copy of important data at another location, which is called . Any paper that contains confidential data should be before it is recycled.
protection can use software and permissions; for example, giving someone the minimum permissions, installing antivirus and firewall software, and using to protect data while it is at rest and in motion.