[go: up one dir, main page]

0% found this document useful (0 votes)
31 views1 page

Data Security & Controls

The document discusses data security and controls, defining data security and privacy and identifying security threats, types of computer crimes, and laws governing protection of information and communication technology systems.

Uploaded by

Denis Marube
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views1 page

Data Security & Controls

The document discusses data security and controls, defining data security and privacy and identifying security threats, types of computer crimes, and laws governing protection of information and communication technology systems.

Uploaded by

Denis Marube
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Mobile: 0700152177 OR 0752031300

Email:kisiipoly@yahoo.com
kisiipolytechnic@gmail.com
kisiipolytechnic@kisiipoly.ac.ke
Website: www.kisiipoly.ac.ke

DATA SECURITY & CONTROLS


By the end of the topic, the learner should be able to:-
- Define the term data security and privacy
- Identify security threats on ICT and possible control measures
- Identify types of computer crimes
- Discuss laws governing protection of information and communication technology
systems.

Introduction and definition


Security threats and control measures
 Viruses
 Unauthorized access
 Computer errors and accidental access
 Theft
Computer crimes
 Trespass
 Hacking
 Tapping
 Cracking
 Piracy
 Fraud
 Sabotage
 Alteration
Detection and protection against computer crimes
 Audit trial
 Data encryption
 Log files
 Firewalls
Laws governing protection of information

Mr. Marube
0724325936

You might also like