Big6 (Computer Security)
by Farhana Khalid
1. Task Definition
1.1. Define the Problem
1.1.1. Define computer security
1.2. Identify the information needed to complete the task
2. Information Seeking Strategies
2.1. Determine the range of possible sources (brainstorm)
2.2. Evaluate the different possible sources to determine priorities (Select the best resources)
2.2.1. Briefly explain the difference threats to computer security:
2.2.1.1. Malicious Code
2.2.1.2. Hacking
2.2.1.3. Natural Disasters
2.2.1.4. Information Theft
3. Location and Access
3.1. Locate resources
3.1.1. Choosing appropriate security measures to overcome computer threats identified
3.2. Find information within sources
4. Use of Information
4.1. Read, view information - decide which parts you want to use (and leave out)
4.1.1. Using the correct procedure
4.1.1.1. Antivirus
4.1.1.2. Anti-Malware
4.1.1.3. Cryptography
4.1.1.4. Firewall
4.1.1.5. Data Backup
4.1.1.6. Human Aspect Awareness