Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
II. Security:
1. How can the computer hardware be protected from damage or unauthorized modification?
2. How can the data be protected from being changed, deleted or copied by unauthorized people?
3. Who is allowed to access the hardware and the files stored on a computer?
4. How can we protect the computer systems from computer viruses and other malware?
5. How can we protect the computer systems from hackers?
V. Authenticity:
1. What authentication method should be used?
2. How secure are the authentication methods?
3. What are some consequences of identity theft?
VII. Surveillance:
1. Should employees be monitored by their bosses?
2. Under what circumstances is this acceptable?
3. How can people be controlled with the help of IT/
4. What benefits and problems does control offer?