File Management and Protection/Common Threats/Key points
From WikiEducator
File Management and Protection | |
---|---|
Common Threats | Introduction | Identifying common threats | Ensuring integrity | Securing your system | Key points | Assessment |
Key points
On completion of this unit, you will now be able to identify common threats and describe them in terms of their impact on the data stored in a computer system, such as:
|
If you are completing the assessment for this course, please continue to ensure you have completed the assessment activities for this unit.
Otherwise, please continue with the next unit, Data Protection.
Acknowledgements
The content of this unit has been adapted from the Personal Computer Basics workbook, developed by the Community Learning Centre, Otago Polytechnic, December 2011.