Managing Data

Security Techniques for the Management of Data

Managing data in the WACE syllabus falls under two main security techniques; disaster recovery plans and audit trails.

Disaster Recovery Plans

Disaster recovery plan is a written plan to restore business ICT equipment after a disaster has taken place. 

It includes the steps to restore areas of ICT equipment such as web servers as well as procedures to restore data from backups. 

Audit Trails

Audit trails are an electronic or paper log that records details about a user's access to a file. Audit trails record details about access to specific documents including:

  • when the data was accessed

  • who accessed it

  • what was accessed

  • In most cases, it does not show why the data was accessed. Sometimes very secure systems may ask for a reason before asking sensitive data

Audit trails allow administrators to review who has been accessing data and identify any unusual behaviour which can be investigated further. When files are moved or modified, audit trails can be used to identify who was responsible for such actions.


ABN: 87 574 760 103

  • Facebook - Black Circle
  • YouTube - Black Circle

"ATAR" is a registered trademark of Monash University as a Trustee For The Victorian Tertiary Admission Centre .The School Curriculum and Standards Authority (SCSA) have no involvement in or responsibility for any material appearing on this site. Nor does SCSA endorse or make any warranties regarding the study resources, current and past WACE exams available on this site or sold by Christian Bien. 

Copyright © 2020 Christian Bien at the ATAR Survival Guide