Mobile: 0700152177 OR 0752031300
Email:kisiipoly@yahoo.com
kisiipolytechnic@gmail.com
kisiipolytechnic@kisiipoly.ac.ke
Website: www.kisiipoly.ac.ke
DATA SECURITY & CONTROLS
By the end of the topic, the learner should be able to:-
- Define the term data security and privacy
- Identify security threats on ICT and possible control measures
- Identify types of computer crimes
- Discuss laws governing protection of information and communication technology
systems.
Introduction and definition
Security threats and control measures
Viruses
Unauthorized access
Computer errors and accidental access
Theft
Computer crimes
Trespass
Hacking
Tapping
Cracking
Piracy
Fraud
Sabotage
Alteration
Detection and protection against computer crimes
Audit trial
Data encryption
Log files
Firewalls
Laws governing protection of information
Mr. Marube
0724325936