Planning for the week 9:
- Network administration
- Electronic security: for example, authorized access, levels of access, biometrics, login, password, firewalls, proxy server, encryption, secure socket layer (SSL), audit trails
- Licences: single-user, multi-user, concurrent, network, site
- Physical security: for example, locks
- Monitoring: for example, keystroke monitoring, system performance, surveillance
- Network policies: for example, backup, archiving, disaster recovery, usage, redundancy, failover
- Codes of ethics and professional conduct: for example, ACM (Association for Computing Machinery)
- Data centres
- Energy usage, uninterruptable power supply (UPS)
No comments:
Post a Comment