answersLogoWhite

0


Best Answer

Control access rights

When logged on not everyone can access all the files or they can read them but not copy or edit them. This protects data from internal threats like workers selling important data for personal gain.

System can control files uploaded/downloaded to internet

This can prevent workers from uploading sensitive company information to the internet. They might want to do this to sabotage the company. It can also prevent workers from downloading viruses or spyware deliberately or accidentally to the companies system.

Network security software

This can be set to do a lot of deferent things to detect and prevent security abuses of the network. It can record who is logged on and what they are doing on the network. Also it can generate warnings if someone repeatedly types an incorrect password alerting people to the possible threat.

Auto save

This software can automatically save files that have not been saved in a certain amount of time. This can control the amount of work lost in a power failure or computer crash. Work done before the auto save will remain and this is a better result that losing the entire days work.

User Avatar

Wiki User

12y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What are the hardware measures that can be taken to protect ICT systems?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Continue Learning about Computer Science

How could one describe computer security?

Computer security basically refers to the preventive and resistive measures taken to protect information, ensure integrity of the system and to prevent unauthorized access to information or computing resources. Computer security is required to protect hardware, software, sensitive information and it is enforced using software solutions (antivirus, firewall, encryption, digital certificates, authentication and authorization protocols etc) or hardware solutions (firewall, antivirus, biometrics etc). Along with hardware and software security solutions, formulating and enforcing strict policies and educating about threats are very important for computer security.


Five Measures that can be taken to secure data?

grammar & spelling word spell checker read over check for error stor data


Modern automotive technology 7th answers key?

When working on charging systems, allot the following precautions should be taken , expect


What courses does itt tech offer?

ITT Tech schools offer courses in health sciences, education, technology, and criminal justice. These classes include nursing classes, computer classes, and law classes.


What are the Service provided by operating system?

Operating system (OS) provides two main services: file management and user interface with the hardware system. ^^ Following are the five services provided by an operating systems to the convenience of the users. The purpose of a computer systems is to allow the user to execute programs. So the operating systems provides an environment where the user can conveniently run programs. The user does not have to worry about the memory allocation or multitasking or anything. These things are taken care of by the operating systems. Running a program involves the allocating and deallocating memory, CPU scheduling in case of multiprocess. These functions cannot be given to the user-level programs. So user-level programs cannot help the user to run programs independently without the help from operating systems. === === === === Each program requires an input and produces output. This involves the use of I/O. The operating systems hides the user the details of underlying hardware for the I/O. All the user sees is that the I/O has been performed without any details. So the operating systems by providing I/O makes it convenient for the users to run programs. For efficiently and protection users cannot control I/O so this service cannot be provided by user-level programs. === === === === The output of a program may need to be written into new files or input taken from some files. The operating systems provides this service. The user does not have to worry about secondary storage management. User gives a command for reading or writing to a file and sees his her task accomplished. Thus operating systems makes it easier for user programs to accomplished their task. This service involves secondary storage management. The speed of I/O that depends on secondary storage management is critical to the speed of many programs and hence I think it is best relegated to the operating systems to manage it than giving individual users the control of it. It is not difficult for the user-level programs to provide these services but for above mentioned reasons it is best if this service s left with operating system. === === === === There are instances where processes need to communicate with each other to exchange information. It may be between processes running on the same computer or running on the different computers. By providing this service the operating system relieves the user of the worry of passing messages between processes. In case where the messages need to be passed to processes on the other computers through a network it can be done by the user programs. The user program may be customized to the specifics of the hardware through which the message transits and provides the service interface to the operating system. === === === === An error is one part of the system may cause malfunctioning of the complete system. To avoid such a situation the operating system constantly monitors the system for detecting the errors. This relieves the user of the worry of errors propagating to various part of the system and causing malfunctioning. This service cannot allowed to be handled by user programs because it involves monitoring and in cases altering area of memory or deallocation of memory for a faulty process. Or may be relinquishing the CPU of a process that goes into an infinite loop. These tasks are too critical to be handed over to the user programs. A user program if given these privileges can interfere with the correct (normal) operation of the operating systems.

Related questions

What are the measures to protect environment?

what measures are taken to protect the environment in Canada


What are measures taken to protect consumers?

envi


What measures have been taken to protect the blue whale?

there is not much whaling anymore


What measures should be taken to protect snow leopard?

It's illegal to hunt it.


What measures did the government take to save the earth?

what are the measures to be taken over to protect the earth


Google has taken adequate measures to protect its users privacy?

Yes, because of it's personal information.


What measures can be taken to protect Himalayan musk deer?

government is doing noithing to save musk deer


What measures are being taken to protect tsunami victims?

giving shelter and food and water and stuff to just help you get through it


What measures can be taken by the industries protect ozone layer?

Industries must look to stop using CFC's. They react with ozone to deplete it.


What measures has government taken against untouchables?

Measures. Taken by government for Untouchabilty


The active and passive measures taken to protect the area population and infrastructure of the US and its possessions and territories?

homeland defense and civil support operations


What measures are being taken today to protect communities at risk?

i think people these days are trying to cotrol the hydregen bonds because that may effect