Ex Cr 4 Unit 3&4
Understanding of data
integrity and information security protection strategies
applied within organisations. (15%) HOME
Item
Number
|
Unit
3 Criteria
|
Examples/Sources
from
IT@Work
|
4.1
|
obligations of org. and individuals to monitor and control flow and access of info | 8–9, 22, 282–5, 357–60 |
4.2
|
procedures used to enhance security of info produced. and communicated | 92–3, 271–8, 280–1 |
4.3
|
equipment used to enhance the security of info produced and communicated | 74, 255, 271–2, 276–7, 279, 281–2, 345 |
4.4
|
strengths/limitations of procedures and equipment to protect info security | 250, 254–7, 260, 269, 271, 273–5, 277–8, 280 |
Unit
4 Criteria
|
||
4.5
|
factors affecting the value of info in org. | 250–2, 257–8, 259, 268–71, 277 |