• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Data Security for the new system

Extracts from this document...

Introduction

Objectives of the new system Below are the objectives that must be achieved when my system is complete. These will help achieve the goals I have for my system. * The new system has to be efficient and fast. It has to hold data about the schools, the amount of uniform stock has left to the relevant schools, keep track of stock levels and make sure the correct amount of stock leaves the warehouses. The system must be easily accessible, be presented clearly and make sure its readable. The data required by the user must appear quickly as data may be required while a user is speaking to a client. * The main objective that the system must achieve is to create a suitable database that will hold information on the schools, stock levels, and the stock control that are held within the warehouse. It has to say where the stock has gone and keep tabs on how many stock schools have taken for the year. * The system will hold details of the schools who have been dealing with them. Every school will have a unique user ID number. If the user requires information about the school they can do a sort to find the school using this number. ...read more.

Middle

Access rights to a particular set of data could typically be set to Read-Only, Read/Write, or No Access. This ensures that users within a company can only gain access to data that they are permitted to see, and can only change data on the database if they are authorised to. Securing against fraudulent use or malicious damage Disgruntled employees or theft of software or data that may fall into the hands of competitors often exposes organisations to the possibility of fraud, deliberate corruption of data. Measures to counteract these risks include: * Careful vetting of prospective employees * Immediate removal of employees who have been sacked or who hand in their resignation, and cancellation of all passwords and authorisations * Separation of duties * Prevention of unauthorised access by employees and others to secure areas such as computer operations rooms, by means of machine readable cards or badges or other type of locks * The use of passwords to gain access to the computer system from terminals Protection against viruses Below are steps that can be taken to minimise the risk of suffering damage from viruses: * Making sure that all purchased software comes in sealed packaging * Not permitting floppy disks containing software or data to be removed from or brought into the office * Using anti virus software to check all floppy disks before use Periodic backups This is the most common technique to ensure that data isn't lost. ...read more.

Conclusion

Smaller amounts of data may be able to fit onto zip drives. * Location of backup storage. The data needs to be held in a secure location incase of fire ore burglary. Many organisations have fireproof safes for latest backups, with other sets of backups stored off-site * Responsibility for implementing the backup strategy. Although a computer operator may perform the regular backup routine, the senior manager should have overall responsibility for ensuring that all aspects of the backup strategy are properly implemented. * Testing of recovery procedures. At regular intervals the effectiveness of the backup strategy needs to be tested to ensure that the organisation can recover quickly from loss of data. It would be bad to see that the tapes or disks meant for backup ended up to be blank Recovery procedures A contingency plan needs to be developed to allow rapid recovery from major disruptions. In addition to file back-up procedures it is necessary to: * Identify alternative compatible equipment and security facilities, or implement a service agreement that provides replacement equipment when needed. This may also include putting up temporary office space * Have provision for alternative communication links As you can see from all the procedures above doing these measures will take time. The company is also quite weak with computers so training them on how to get the best from their security will have to come from an external source. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    Designing a data system for a vintage clothes business.

    3 star(s)

    The data is not split into logical sections and headings - which mean specific data, may be difficult to find if Luki were to look for the specified data. If Luki?s handwriting became unclear/ or the buyer wrote down something and was not able to be read, then this would be a significant problem.

  2. What is transaction processing?

    By one estimate, personal computers alone account for 115 billion sheets of paper per year worldwide" (www.scam.co.za) In the late 1970's and early 80's 'paperless office' and 'office automation' were major buzzwords. Newspapers, magazines and trade journals used up forests writing about how computers would make the printed word obsolete.

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    Encryption Riverside could also encrypt data that it passes through the Internet or their own Intranet or LAN. Encryption codes the data at the sending end so that if it is intercepted between it's start off point and it's destination no other person other than who it is intended for can read it.

  2. Smart Card System

    There are also contacts less smart card. Contact less smart card don't require contact smart card reading, but are recognized by contact less smart card terminal which has to be near by! The technology is already in place to allow the consumers to combine services, such as their credit cards, long distance services, and ATM cards into one card.

  1. Propose to research the WTLS or Wireless transport layer security protocol along with the ...

    6One of the only ways currently known to actually get to the server itself is to have someone on the inside of the business that is helping the hacker or that is the hacker. If the 'hacker' cannot determine the algorithm that stores items in RAM temporarily then the case

  2. Infernowear is a new company run by a self-employed creative designer aiming to producing ...

    Data flow diagram: The DFD below shows how the new computerised system will take orders and how the data will flow through out the system starting with the customer placing an order and ending with the orders being shipped to the customer.

  1. The Global Positioning System

    There are no diagrams, as a three dimensional picture would just be confusing. These equations can again be solved numerically, giving the receivers position (X,Y,Z) So far, the basic maths being used here has assumed that all the clocks on all the satellites and on the receiver are perfectly synchronised with each other.

  2. Small Office Network Implementation - hardware and security.

    A switch works at data link layer (Layer 2) of the OSI (Open Systems Interconnection) model. Network switches are capable of inspecting data packets as they are received, determining the source and destination device of that packet, and forwarding it appropriately.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work