7. Logical methods
The next few pages look at the different 'logical' methods that can be used to ensure the security of ICT systems and data.
Logical in this case means computer-based methods that can be put in place by the network or system administrator.
They include:
- backups
- firewalls
- encryption
- software patches/updates
- anti-virus and anti-spyware software
- access rights
- auditing
- user IDs and passwords
challenge see if you can find out one extra fact on this topic that we haven't already told you
Click on this link: Computer based security