• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Security Project

Extracts from this document...

Introduction

Zunaira Sufi (10E) Security Project WEEK 1 Task 17.1: - You have been asked by your school to suggest what they should do to protect their computers and hardware. Explain why this is important. Every school needs to take precautions of the securing of hardware, software and data very seriously as the consequences of the violation of security can be extremely damaging to the school. They can mean loss of documents, links and important software, which could result in total chaos spreading throughout the school. Safeguarding in opposition to theft of computers from workplaces involves physical security. This means that measures need to be taken in order to prevent the theft of the actual equipment and to prevent trespassers from entering the premises. This can be done by: - > Restricting access to the computer rooms, so that only authorised students would be allowed in. This would limit unwanted students who have no reason to be in the room. Also, this allows the student using the hardware or computer to be held responsible if anything does happen. > Restricting certain websites and games etc. to prevent unwanted spam and viruses from entering the computer network. > Updating antivirus software to protect the computer network from fatal viruses, which could destroy stored data in the hard drive. ...read more.

Middle

This is important because it will again stop any person from breaking into the room, and would therefore prevent computer hardware thefts. > By using independent alarms on all hardware present, which remain in operation when the main security alarms are inactive, the hardware would be very safe due to the fact that the alarm would go off if a person tried to steal a particular hardware. This would also give a strong secure atmosphere where personnel wouldn't feel intimidated about thieves. > Marking all equipment with ultra-violet pens and making an inventory of all the serial numbers appointed to the different pieces of equipment present in each room or section. This is important because if a piece of equipment is stolen and recovered, it can be traced back to its owner and can go back to its original location. WEEK 3 Task 17.3: - Explain how accidental loss of computer equipment can happen and in your own words explain what back-up of data can be done. Data is very valuable to an organisation and, similar to computer hardware, is at risk from accidental loss or deliberate damage and theft. Accidental loss can be caused by a number of ways, such as: - > The document is accidentally deleted of unintentionally written over. > The computer breaks down or the power fails, and if the user has not saved the document, data can result in being lost. ...read more.

Conclusion

> Never open a file attachment in an email without scanning for viruses first, whether it would be from someone I know or not. > Not download software from bulletin boards unless I am confident that it came from a reliable origin. > Make sure that all computer users are aware of the dangers of viruses and also about different ways to prevent the system from being affected. WEEK 5 Task: - 10 revision multiple-choice questions. 1) To provide a security watch on an organisation's premises, the company can install CCTV. 2) To prevent unauthorised entry to computer rooms a keypad could be fitted to the door. 3) Marking equipment with an ultra-violet pen helps to trace stolen equipment back to the owner. 4) A back-up of data stored in a computer can be made using a magnetic tape streamer. 5) An automatic back-up file will have a name ending with .bak. 6) A harmful program that copies itself onto your computer without you intending it to is a virus. 7) To make sure that viruses cannot change them, all software programmes should be write-protected. 8) One way to transmit viruses is by the use of floppy disks that are infected. 9) A hacker is someone who gains unauthorised access to data held in a computer system. 10) To protect sensitive data, files can be encrypted so that the data is scrambled and unreadable. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    An introduction to Identity Theft

    4 star(s)

    from the companies suppliers delivered to a non trading external address of the company to the criminal, all of which could potentially remain undiscovered for a considerable period of time. AFFECTS ON THE VICTIM Identity theft can have catastrophic consequences for the victim and take years to resolve.

  2. Marked by a teacher

    The systems development life cycle (SDLC) is a conceptual model used in project management ...

    3 star(s)

    Rapid Application Development methodology advocated that development be undertaken by small, experienced teams using CASE (Computer Aided Software Engineering) tools to enhance their productivity. Link: http://www.oware.com/images/RAD.gif Rapid Application Development advocates believed that the development of rapid prototypes was a good way to flush out customer requirements by gaining immediate feedback from the client.

  1. Computing Project

    must be able to register and update customers details with the shop and should give them a unique membership ID in the process which can be used by the rental shop to identify the member * The system must be able to add new DVD's to the existing catalogue and

  2. Primary or Secondary Storage.

    Buffers A buffer is an internal memory area used for temporary storage of data records during input or output operations. For example most modern printers are equipped with buffers that store the information or data to be printed. The speed of printing tends to be slow when compared to the speed at which data is sent to the printer.

  1. GCSE I.T Security Case Study - Riverside Leisure Centre

    in which it may be passed and to whom it may be passed and whether or not it may be transferred from country to country, if yes, which countries. This is filled in on the registration form given by the Data Registrar and is then sent off, along with a fee for registration (around �70).

  2. Computing Project

    The instructor want something that he can have transaction done on, ideally a database that will do transactions, that include calculate a cost, update availability for next lesson and update the file with student lesson. The instructor would be very grateful if we were to include something that will show

  1. Computer Maintainance - anti-virus, cookie deletion, drive scanning

    type disc frag in the search box the utility should appear in the programs section. To open the defragmentation utility in Windows XP: Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Defragmenter.

  2. Small Office Network Implementation - hardware and security.

    or cable. Depending on the broadband provider, you might be required to use additional equipment such as a cable or DSL modem or a residential gateway. * Configuration simplicity- most home or small networks are not managed by an information technology (IT)

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work