Information Security
Example Statement
Can understand and input to the implementation of information security protocols and processes
Example Activities
- Managing permissions to control access
- Undertaking virus checks
- Capturing and analyzing access logs
- Using encryption to secure sensitive data
Resources
Page last modified on 2024-10-24 at 10:30.