• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

BTEC National in IT Organisational systems security - Policies and guidelines for IT security (P4)

Extracts from this document...


1. Policies and guidelines for IT security Disaster recovery policies: This is an action plan if you will of what employees will do as result of a certain disaster. These disasters may include things such as; theft, fire, flood, human error or hardware failure. The recovery policy is put in place to ensure that if such an event occurs the organisation can function as normal again as quickly as possible. There are several things you should consider when designing your disaster recovery policy. What storage media are you going to use will depend on two main factors, how much data needs to be stored and how quickly are you going to need to retrieve this data. Where you store the backup media, you can either store the backups on site which will mean you can retrieve the backups as quickly as possible but makes them vulnerable, or you can store the backup media off-site which makes them more secure but increases the time it takes to retrieve it. ...read more.


Security audits are important to help provide information relating to the improvement of the disaster recovery policies and security procedures. Codes of conduct for email usage policy: This is a set of rules which outlines how a person is to behave within a group setting. For your company this will be used to help improve system security and will attempt to avoid downloading any Waldemar or be subject to any social engineering which may harm your systems or company. This will be enforced by the use of a contract that your employees must sign putting legal obligation on them to follow the codes of conduct. In relation to email usage it may include things such as; size of attachments, how to manage the in box, what personal view may be expressed, response times, forwarding of emails to other, unacceptable behaviour such as harassment or sending spam among other things. Included in this should be the right for the network administrator to monitor employees emails. Surveillance policy: This may be relate to the monitoring of premises by the use of CCTV cameras to improve physical security, or it ...read more.


Risk management can refer to your systems security and be tackled by keeping systems software updated and installing anti-virus programmes or it may simply be in regards to health and safety. Budget setting: This is how much money you put into your systems security and it should reflect the amount of financial damage that may occur as a result of a security leak of your systems. Budget setting in relation to to systems and organisation security should not be an after thought, without proper funding for an appropriate security system the risk of loss increases exponentially. Budget setting in general in itself is a security risk, if it is done improperly then the organisation as a whole suffers and may even become bankrupt. Smart budget setting for systems security is therefore imperative, things that must be considered in terms of the cost to benefit ratio are as follows; software licensing, security personnel wage, how much an audit will cost, the cost of your chosen disaster recovery plan for example the cost of backup media and the training of staff for your security procedures and codes of conduct. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    Business & IT Department BTEC. Organisational System Security - Describe the various types of ...

    3 star(s)

    Human Errors: is when someone makes a mistake which results in data being lost. Incidents such as people accidentally deleting files and pulling plugs and such. 5. Theft: Theft occurs when criminals gain access to an office building or other work environment and physically steal hardware and other entities

  2. Peer reviewed

    information systems assignment 2

    4 star(s)

    Explain the purpose and operation of data mining and predictive modelling Within this section I will explain what data mining is and what predictive modelling is. I will the further explain and justify how and why they can be used within the Rufus Supermarket Data Mining Data mining is defined

  1. Peer reviewed

    Organisational system security - The possible security issues which exist within the FilmPoster.com system

    3 star(s)

    at a fake website created by the phisher which is identical to the legitimate website. M2 Explain the operation and effect of two Different threats involving gaining access to information without damage to data. Denial services attack: denial service attacks prevent users from accessing a computer or a website, attempting

  2. Computer systems assignment 1

    If it is read by the computer I Click on the icon of CD-drive to explore the content of the CD. After that I look for an icon "Setup" and double click on it to start the installation process. In the main setup window I can see that it is

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    Which organisation will perform the processing? Data subjects have the right to have inaccurate data amended or deleted. They also have new rights of: * preventing processing that is likely to cause damage or distress and to sue for compensation if damage or distress has been caused.

  2. Smart Card System

    are required to enter their password to verify the authority to use the system Attributes Description Form Name: Student Programme Description: This attribute contains the programme taken by student. Element Characteristics Length: 50 Dec. Pt.: None Input Format: 50(45) Output Format: 50(45)

  1. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    The simple, plastic connectors (RJ jacks and plugs) are also remarkably simple to use and inexpensive to manufacture. Twisted pair is commonly used to wire homes and businesses to the nearest telephone exchange and to wire private branch exchanges in businesses.

  2. Computer Crime, Security and Data Protection.

    Some are malicious, some aren't. A virus is a program that may or may not attach itself to a file and replicate itself. It may or may not corrupt the data of the file it invades. It may or may not try to use all of the computer's processing resources in an attempt to crash the machine.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work