Summary
Summary C.M3/D2 Examine the techniques used to protect an IT system from security threats | UNIT 7: IT SYSTEMS SECURITY AND ENCRYPTION | BTEC Computing
- Course
- Institution
Examine the techniques used to protect an IT system from security threats: C.M3 Justify the choice of protection techniques used to defend the IT systems of an organisation, showing how its IT system will be protected from security threats. CD.D2 Evaluate the plan and the effectiveness of the pro...
[Show more]