• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Unit 3- Business Information Systems.

Extracts from this document...


Provide an analysis of the reasons why it is important to keep data safe and secure. It is important to keep data safe and secure because if a company do not do so, then the data is vulnerable to other people and companies. This is very dangerous for the company as that data may be financial data or their customer's data. If another company steals the data then they are likely to know the important details of the Company they have stolen the data from and may take advantage of that data. If a company do not use a login system, which allows only authorised users to view such confidential data by using usernames and passwords then they would be more vulnerable to unauthorised users therefore they allow their confidential data to be viewable to unauthorised users. For example if a travel agent lose their data it is very dangerous for the company as their data contains personal details on their customers and all their prices for their tickets also the ticket details of future booking which is all very vital data. ...read more.


Also you would allow viruses to damage your computer system. If you do not use spam protection for your email inbox then you may receive unwanted junk mail. This junk mail can be offensive material such as pornography including both text and images. These things can promote sexism, violence and personal abuse. If you do not use anti-virus software such as Norton anti-virus or MacAfee anti-virus when using the internet then you are dangerously putting yourself at risks. This is because viruses are spread mainly on the Internet and where there is no kind of anti-virus protection, the virus can spread to that computer system. By doing so it can corrupt the file on your computer, stop programs not functioning properly or at all and can damage the whole computer system. If you do not use firewall software when using the Internet then you would allow unauthorised users such as hackers or intruders to hack into computer systems. This would result in the hackers to view all your confidential data and it would allow them to edit the data or permanently delete the data. ...read more.


Describe measures to protect against Internet security threats. There are two types of software's to protect you from Internet security threats; these are anti-virus software and firewall software. Anti-virus software helps to protect your computer from viruses while using the Internet by finding a virus if it occurs onto your computer and automatically destroying the virus itself or it would let you know before doing so. Anti-virus software also scans for any types of viruses on your computer system and deletes them if it has found any. If a virus has already affected your computer then anti-virus software can fix it by recovering the infected program or file. Examples of anti-virus software are Norton Anti-Virus and MacAfee Anti-Virus. Firewall software helps to protect your computer from hackers and intruders while you are using the Internet. If a hacker were to hack into your computer system, firewall software would prevent him or her from doing so by blocking the network from him or her and your computer. Examples of firewall software are Norton Firewall and MacAfee Firewall protection. By using both anti-virus protection and a firewall software your computer is protected from the danger the Internet has to offer. Unit 3 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    The systems development life cycle (SDLC) is a conceptual model used in project management ...

    3 star(s)

    It is not very common. So it is difficult to understand. DSDM Model Advantages * Active user participation throughout the life of the project and iterative nature of development improves quality of the product. * DSDM ensures rapid deliveries. * Both of the above factors result in reduced project costs [FRE10] Free tutes(2010)

  2. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    OCR tends to be an unreliable form of input and works more effectively when it is restricted to having to recognise a standard character set produced by printing rather than by using hand writing. OCR is used for reading post codes on printed documents and also for reading documents for

  1. Hardware and Software

    Enhances Readability - It's easier to read larger fonts. 3. Better proof that it can work and look good - Design is working and looking good. 4. Some of the monitors produce excellent colour quality and they can be moved around for a better landscape and portrait mode.

  2. Today's competitive global business environment, understanding and managing enterprise wide information is crucial for ...

    Access to the computer area is gained through the use of a small radio transmitter located in the authorized employees' identification badges. When the authorized person comes to within a predetermined distance of the entry door, a radio signal sends a key number to the receiver, which opens the door for admittance.

  1. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    The excess of vendors and economies of scale on this cabling did not do unnoticed by the data communications industry that is quickly that is developed by various kinds of computer networks that could use the same media. 10 Base-T Ethernet is probably the most popular local area network, in part because of the low cost cabling.

  2. I have been given the task to design a database for a company called ...

    the correct data which should be displayed. Once the query has run it comes out will the following result which when checked with the data sheets shows that the results are correct and the query works. To see if the query still worked when I typed in only 'Gemm' the results were the same as before.

  1. Smart Card System

    The 32-bit wsock32.dll ships with Windows NT and Windows 95 and runs over the Microsoft TCP/IP stack. These 32-bit environments also have a winsock.dll file that acts as a "thunk-layer" to allow 16-bit WinSock applications to run over the 32-bit wsock32.dll.

  2. CP3 - Proposed Solution to a Realistic Problem - Apartment Administration software

    There is no need for a network connection. This suits my client because they will be the only one who uses the program and this improves security and prevents unauthorised access. The program also generates fairly quick results and the user does not have to wait for along time to see the output of this results.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work