Question: 2 . 1 . Discuss three ( 3 ) input devices used at ABSA. ( 6 ) 2 . 2 . Organisations are implementing policies

2.1. Discuss three (3) input devices used at ABSA. (6)
2.2. Organisations are implementing policies that prevent or block the usage of USB
Drives. Analyse why organisations have opted to prevent or block the usage of USB Drives. (10)
2.3. ABSA have called in cyber security experts to work with their team after the website was infected by a ransomware virus that encrypted its computer databases applications and network.
2.3.1. List four (4) software security vulnerabilities that could occur at ABSA. (4)
2.3.2. What would you recommend ABSA do to mitigate their security vulnerabilities? (5)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!