ICT Data Security 3 Dissertation Example For Download

5
(2)
Category: Engineering
Subcategory: High School
Level: High School
Pages: 1
Words: 275
Get document Get an original paper

There are various techniques used to control physical access and ensure security for ICT systems. Locks are used for locking doors to sensitive areas such as the server room where only authorized personnel are given the key. Biometric controls are the use of voice detection, fingerprint scanners, and retina detection to prevent unauthorized persons from gaining physical access to rooms and workstations. CCTV provides evidence of events that are occurring or already took place that can be given to the police to catch culprits. They can also be set to ring an alarm when they detect movement thus alerting security of a breach. Fire detection and control systems protect the devices within a building from getting damaged due to fire. Finally, a shielding cable is an insulated conductor that is enclosed in a conductive layer to protect against power frequency and radio frequency interference thus minimizing false alarms. Also, they prevent current leakage and electric shock. There are variou...

Free ICT Data Security 3 Dissertation Example

All examples
Do you need an original dissertation?

Approach our writing company for get top-quality dissertation services and paper written from scratch strictly on time!