Вы находитесь на странице: 1из 1

Create strong and Use trusted Back up data

memorable computers and regularly & update


Nur Ain Atirah Bt Hamidon passwords connections anti-virus
B031810150 Use caution when Do not share
Stay vigilant opening email sensitive
3BITS attachments information easily
Lock your IT
Check privacy
belongings with a settings of social
PIN or password
media
Phishing
Confidentiality

Worms
Integrity
Security Tips
Email Spam
Availability
Trojan

Ransomware Threats C-I-A


Information Security deals
with security-related issues
Viruses & Malware and it ensures that technology
is secure and protected from
possible breaches and attacks.

Web Control Information Technology


deals with deploying the
technology that will help
Device Control Information for the running and
Control Technology &
growth of a business.

Endpoint IT SECURITY
Application Control Security

Вам также может понравиться