• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Security Project

Extracts from this document...

Introduction

Zunaira Sufi (10E) Security Project WEEK 1 Task 17.1: - You have been asked by your school to suggest what they should do to protect their computers and hardware. Explain why this is important. Every school needs to take precautions of the securing of hardware, software and data very seriously as the consequences of the violation of security can be extremely damaging to the school. They can mean loss of documents, links and important software, which could result in total chaos spreading throughout the school. Safeguarding in opposition to theft of computers from workplaces involves physical security. This means that measures need to be taken in order to prevent the theft of the actual equipment and to prevent trespassers from entering the premises. This can be done by: - > Restricting access to the computer rooms, so that only authorised students would be allowed in. This would limit unwanted students who have no reason to be in the room. Also, this allows the student using the hardware or computer to be held responsible if anything does happen. > Restricting certain websites and games etc. to prevent unwanted spam and viruses from entering the computer network. > Updating antivirus software to protect the computer network from fatal viruses, which could destroy stored data in the hard drive. ...read more.

Middle

This is important because it will again stop any person from breaking into the room, and would therefore prevent computer hardware thefts. > By using independent alarms on all hardware present, which remain in operation when the main security alarms are inactive, the hardware would be very safe due to the fact that the alarm would go off if a person tried to steal a particular hardware. This would also give a strong secure atmosphere where personnel wouldn't feel intimidated about thieves. > Marking all equipment with ultra-violet pens and making an inventory of all the serial numbers appointed to the different pieces of equipment present in each room or section. This is important because if a piece of equipment is stolen and recovered, it can be traced back to its owner and can go back to its original location. WEEK 3 Task 17.3: - Explain how accidental loss of computer equipment can happen and in your own words explain what back-up of data can be done. Data is very valuable to an organisation and, similar to computer hardware, is at risk from accidental loss or deliberate damage and theft. Accidental loss can be caused by a number of ways, such as: - > The document is accidentally deleted of unintentionally written over. > The computer breaks down or the power fails, and if the user has not saved the document, data can result in being lost. ...read more.

Conclusion

> Never open a file attachment in an email without scanning for viruses first, whether it would be from someone I know or not. > Not download software from bulletin boards unless I am confident that it came from a reliable origin. > Make sure that all computer users are aware of the dangers of viruses and also about different ways to prevent the system from being affected. WEEK 5 Task: - 10 revision multiple-choice questions. 1) To provide a security watch on an organisation's premises, the company can install CCTV. 2) To prevent unauthorised entry to computer rooms a keypad could be fitted to the door. 3) Marking equipment with an ultra-violet pen helps to trace stolen equipment back to the owner. 4) A back-up of data stored in a computer can be made using a magnetic tape streamer. 5) An automatic back-up file will have a name ending with .bak. 6) A harmful program that copies itself onto your computer without you intending it to is a virus. 7) To make sure that viruses cannot change them, all software programmes should be write-protected. 8) One way to transmit viruses is by the use of floppy disks that are infected. 9) A hacker is someone who gains unauthorised access to data held in a computer system. 10) To protect sensitive data, files can be encrypted so that the data is scrambled and unreadable. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    An introduction to Identity Theft

    4 star(s)

    from the companies suppliers delivered to a non trading external address of the company to the criminal, all of which could potentially remain undiscovered for a considerable period of time. AFFECTS ON THE VICTIM Identity theft can have catastrophic consequences for the victim and take years to resolve.

  2. GCSE I.T Security Case Study - Riverside Leisure Centre

    All staff which need to know the pin code to access the computer have been told the in code but staff which do not use computers as part of their daily routine do not have access to the pin code.

  1. Computing Project

    Name Data Type Length Validation Example Data Comment DVD ID Number Variable Must only be a number 5 The ID of the DVD which is specific to every DVD movie Member ID Number Variable Must only be a number 12 7.

  2. Primary or Secondary Storage.

    Buffers A buffer is an internal memory area used for temporary storage of data records during input or output operations. For example most modern printers are equipped with buffers that store the information or data to be printed. The speed of printing tends to be slow when compared to the speed at which data is sent to the printer.

  1. Smart Card System

    We have needed to consider the system will evolve with the next coming new hardware model. 6.4.2 Software Limitation The platform for the development of the system is mainly based on the use of windows system.

  2. System I designed in order to produce a promotion package for her newly formed ...

    So all the access to all the data by all users including customers could have been done on the Internet. This could be setup in a way where a programming language like Java is used to connect the Access database to the Internet.

  1. Computing Project

    it would be nice to update to the new versions of access every time they are released, usually the new versions become more and more user friendly so this should save me time. IDENTIFICATION OF THE USERS NEEDS AND ACCEPTABLE LIMITATIONS After considering the answers I have received I have

  2. Hardware and Software

    Graphic and Web designers can take advantage of the features that include improved file management, new design possibilities, a way to create for the Web, and support for 16-bit images, digital camera and non-square pixels. This Software can create the highest quality images more efficiently.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work