investigating actions, devices and events that are potential risks to information systems, for example losing portable storage devices containing important files, deliberately infecting systems through malware, and power surges
Rights holder:
Australian Curriculum, Assessment and Reporting Authority
Rights:
© Copyright Australian Curriculum, Assessment and Reporting Authority