[Year 12 IT Apps] Security measures

Russell Edwards edwards.russell.t at edumail.vic.gov.au
Mon Sep 10 12:38:07 EST 2007


Are there any takers for my questions of the 5th of September?

I would like to know

   1)  How much detail we need to give about "procedures and  
equipment for preventing unauthorised access to data and information  
and for minimising the less of data accessed by authorised users"

   2)  Whether there are prescribed "criteria for evaluating the  
effectiveness of data security management strategies".


My default approach would be

   1)  Skim through everything they have in Potts (p 231 - 242) but  
tell them they don't need to know any details  (because Potts seems  
to have gone off the Software Development definition of "security  
devices")

   2)  Provide a break-down: *effective* protection against  
accidental data corruption, deliberate data corruption, deliberate  
physical damage, natural disaster, done *efficiently*, i.e.  
inexpensively, inobtrusively and providing for fast recovery.

I'd very much like to know how others are approaching this!

cheers

Russell Edwards
Whittlesea SC



Important - This email and any attachments may be confidential. If received in error, please contact us and delete all copies. Before opening or using attachments check them for viruses and defects. Regardless of any loss, damage or consequence, whether caused by the negligence of the sender or not, resulting directly or indirectly from the use of any attached files our liability is limited to resupplying any affected attachments. Any representations or opinions expressed are those of the individual sender, and not necessarily those of the Department of Education and Early Childhood Development.


More information about the itapps mailing list