Wednesday, June 23, 2021

IGCSE - ICT - WEEK 19

19th week-Safety and Security-1

Note: To see the next slides just pull the scroll down

Tuesday, June 22, 2021

Data Security 10

Providing security of places that containing personal data

If personal data is stored on paper media or on devices located in the territory of the data controllers, physical security measures must be taken against threats such as theft or loss of these devices and papers.  Likewise, it is important to protect the physical environments containing personal data against external risks (fire, flood, etc.) with appropriate methods and to control the entry/exit to these environments.

πŸ‘‡πŸ‘‡πŸ‘‡Click Read more

Wednesday, June 16, 2021

IGCSE - ICT - WEEK 18

18th week-The systems life cycle-2

Note: To see the next slides just pull the scroll down

Wednesday, June 9, 2021

Data Security 9

Monitoring Personal Data Security

The systems of data controllers are mostly exposed to both internal and external attacks, cybercrime or malicious software, and despite various symptoms, this situation cannot be noticed for a long time and it may be late for intervention.

πŸ‘‡πŸ‘‡πŸ‘‡ Click

Data Security 8

TECHNICAL MEASURES RELATED TO PERSONAL DATA SECURITY

Ensuring Cyber ​​Security

The view that complete security can be achieved with the use of a single cyber security product to ensure personal data security is not always true. Because threats are expanding their spheres of influence by changing their size and nature day by day.

πŸ‘‡πŸ‘‡πŸ‘‡Click Read more

Monday, June 7, 2021

5- Arithmetic Operators

Python can operate with numbers using the usual mathematical operators, and some special operators, too.

πŸ‘‡πŸ‘‡πŸ‘‡Click Read more

ICT - STUDY NOTES 3

HARDWARE–THE SYSTEM UNITS 1


DETAILS

INTRODUCTION
THE SYSTEM UNIT
- Chassis (Case)
- Power Supply
πŸ‘‡πŸ‘‡πŸ‘‡πŸ‘‡πŸ‘‡ click Read more πŸ‘‡πŸ‘‡πŸ‘‡πŸ‘‡πŸ‘‡

Data Security 7

Management of Relations with Data Processors

Some data controllers receive services from data processors to meet their information technology needs.  Data controllers should make sure that the data processors provide at least as much security as their own personal data while receiving services. Because data processors are also responsible for ensuring the security of personal data, together with the data controller.

πŸ‘‡πŸ‘‡πŸ‘‡Click Read more

Friday, June 4, 2021

ICT - STUDY NOTES 2

INTRODUCTION TO COMPUTERS 2


DETAILS

TAKING CARE OF THE COMPUTER

CLEAN OUT THE DUST

  • Monitor Cleaning
  • Keyboard Cleaning
  • Mouse Cleaning
  • Case Cleaning

πŸ‘‡πŸ‘‡πŸ‘‡πŸ‘‡πŸ‘‡ click Read more πŸ‘‡πŸ‘‡πŸ‘‡πŸ‘‡πŸ‘‡

Thursday, June 3, 2021

Data Security 6

10 Steps to Cyber Security

  • Risk Management
  • Engagement and Training
  • Asset Management
  • Architecture and Configuration
  • Vulnerability Management

πŸ‘‡πŸ‘‡πŸ‘‡Click Read more

ICT - STUDY NOTES 1

INTRODUCTION TO COMPUTERS 1

DETAILS

What is a Computer?

HOW COMPUTERS WORK

TYPES OF COMPUTERS

THE HISTORY OF COMPUTERS

πŸ‘‡πŸ‘‡πŸ‘‡πŸ‘‡πŸ‘‡ click Read more πŸ‘‡πŸ‘‡πŸ‘‡πŸ‘‡πŸ‘‡

Data Security 5

Reducing personal data as much as possible

Personal data should be correct and up to date when necessary, must be kept as required for the purpose they are processed. 

However, in particular the data responsible for a long time, the data responsible for collecting a large amount of personal data, a part of these personal data is not correctly accurate with time and it can become data that has not served any purpose. 

πŸ‘‡πŸ‘‡πŸ‘‡Click Read more

Data Security 4

Determination of Data Security Policies and Procedures

The preparation of a good policy regarding personal data security will ensure that the risks in this context can be determined in advance and that measures will be taken consistently.

Correct and consistent policies and procedures to be determined regarding personal data security should be integrated into the work and operation of the data controller.  When the policies and procedures cannot be prepared in a good and timely manner by the data controllers, when the problematic areas cannot be determined or when the existing security measures cannot be used, the personal data security level cannot be adequately provided.

πŸ‘‡πŸ‘‡πŸ‘‡Click Read more