• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Security Project

Extracts from this document...


Zunaira Sufi (10E) Security Project WEEK 1 Task 17.1: - You have been asked by your school to suggest what they should do to protect their computers and hardware. Explain why this is important. Every school needs to take precautions of the securing of hardware, software and data very seriously as the consequences of the violation of security can be extremely damaging to the school. They can mean loss of documents, links and important software, which could result in total chaos spreading throughout the school. Safeguarding in opposition to theft of computers from workplaces involves physical security. This means that measures need to be taken in order to prevent the theft of the actual equipment and to prevent trespassers from entering the premises. This can be done by: - > Restricting access to the computer rooms, so that only authorised students would be allowed in. This would limit unwanted students who have no reason to be in the room. Also, this allows the student using the hardware or computer to be held responsible if anything does happen. > Restricting certain websites and games etc. to prevent unwanted spam and viruses from entering the computer network. > Updating antivirus software to protect the computer network from fatal viruses, which could destroy stored data in the hard drive. ...read more.


This is important because it will again stop any person from breaking into the room, and would therefore prevent computer hardware thefts. > By using independent alarms on all hardware present, which remain in operation when the main security alarms are inactive, the hardware would be very safe due to the fact that the alarm would go off if a person tried to steal a particular hardware. This would also give a strong secure atmosphere where personnel wouldn't feel intimidated about thieves. > Marking all equipment with ultra-violet pens and making an inventory of all the serial numbers appointed to the different pieces of equipment present in each room or section. This is important because if a piece of equipment is stolen and recovered, it can be traced back to its owner and can go back to its original location. WEEK 3 Task 17.3: - Explain how accidental loss of computer equipment can happen and in your own words explain what back-up of data can be done. Data is very valuable to an organisation and, similar to computer hardware, is at risk from accidental loss or deliberate damage and theft. Accidental loss can be caused by a number of ways, such as: - > The document is accidentally deleted of unintentionally written over. > The computer breaks down or the power fails, and if the user has not saved the document, data can result in being lost. ...read more.


> Never open a file attachment in an email without scanning for viruses first, whether it would be from someone I know or not. > Not download software from bulletin boards unless I am confident that it came from a reliable origin. > Make sure that all computer users are aware of the dangers of viruses and also about different ways to prevent the system from being affected. WEEK 5 Task: - 10 revision multiple-choice questions. 1) To provide a security watch on an organisation's premises, the company can install CCTV. 2) To prevent unauthorised entry to computer rooms a keypad could be fitted to the door. 3) Marking equipment with an ultra-violet pen helps to trace stolen equipment back to the owner. 4) A back-up of data stored in a computer can be made using a magnetic tape streamer. 5) An automatic back-up file will have a name ending with .bak. 6) A harmful program that copies itself onto your computer without you intending it to is a virus. 7) To make sure that viruses cannot change them, all software programmes should be write-protected. 8) One way to transmit viruses is by the use of floppy disks that are infected. 9) A hacker is someone who gains unauthorised access to data held in a computer system. 10) To protect sensitive data, files can be encrypted so that the data is scrambled and unreadable. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    An introduction to Identity Theft

    4 star(s)

    Its pattern is said to be predictable. It will usually entice the victim into parting with their banking/private information with large sums of money allegedly due to them. It may name high ranking officials and forged official and or legal documentation to endorse legitimacy. It may involve a high profile investment portfolio, easily researchable by the victim

  2. Marked by a teacher

    The systems development life cycle (SDLC) is a conceptual model used in project management ...

    3 star(s)

    quick-and-dirty prototype-style software which fulfilled most of the user's requirements but not necessarily all. Development would take place in a series of short cycles, called time boxes, each of which would deepen the functionality of the application a little more.

  1. Computing Project

    must be able to register and update customers details with the shop and should give them a unique membership ID in the process which can be used by the rental shop to identify the member * The system must be able to add new DVD's to the existing catalogue and

  2. GCSE I.T Security Case Study - Riverside Leisure Centre

    However, if the computer is stolen then the next user can carry on encrypting or decoding messages and this would prove not very secure. To overcome this problem you could either: * Make sure the computer is surrounded by physical security and therefore cannot be stolen.

  1. Free essay

    Setting up and E-Commerce Site

    * A custom web design within your budget * A basic web package is available for the very budget-conscious * A complete redesign of your existing website * Website maintenance as you need it * Graphic designs for your website * Domain name registration * Yearly hosting at a very

  2. Spare Parts Database Project

    Deleting a record To delete a record, first find it using the Find record combo box, change the information and click on Delete record. Transaction File Add a new record In order to add a new record, click on Add new and after adding all the information, click on Save.

  1. Computing Project

    Will you be the only user? Yes I will be the only user to access the details and your software, it would be necessary to have it password protected for data protection purposes. Can you use software such as access to input and view data? Yes I have had training on this, this is what they

  2. Smart Card System

    For the second step, in some protocols, we can apply up to two access lists to an interface: one inbound access list and one outbound access list. With other protocols, we apply only one access list, which checks both inbound, and outbound packets.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work