[Year 12 IT Apps] Security measures
Russell Edwards
edwards.russell.t at edumail.vic.gov.au
Mon Sep 10 12:38:07 EST 2007
Are there any takers for my questions of the 5th of September?
I would like to know
1) How much detail we need to give about "procedures and
equipment for preventing unauthorised access to data and information
and for minimising the less of data accessed by authorised users"
2) Whether there are prescribed "criteria for evaluating the
effectiveness of data security management strategies".
My default approach would be
1) Skim through everything they have in Potts (p 231 - 242) but
tell them they don't need to know any details (because Potts seems
to have gone off the Software Development definition of "security
devices")
2) Provide a break-down: *effective* protection against
accidental data corruption, deliberate data corruption, deliberate
physical damage, natural disaster, done *efficiently*, i.e.
inexpensively, inobtrusively and providing for fast recovery.
I'd very much like to know how others are approaching this!
cheers
Russell Edwards
Whittlesea SC
Important - This email and any attachments may be confidential. If received in error, please contact us and delete all copies. Before opening or using attachments check them for viruses and defects. Regardless of any loss, damage or consequence, whether caused by the negligence of the sender or not, resulting directly or indirectly from the use of any attached files our liability is limited to resupplying any affected attachments. Any representations or opinions expressed are those of the individual sender, and not necessarily those of the Department of Education and Early Childhood Development.
More information about the itapps
mailing list