• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Unit 3- Business Information Systems.

Extracts from this document...

Introduction

Provide an analysis of the reasons why it is important to keep data safe and secure. It is important to keep data safe and secure because if a company do not do so, then the data is vulnerable to other people and companies. This is very dangerous for the company as that data may be financial data or their customer's data. If another company steals the data then they are likely to know the important details of the Company they have stolen the data from and may take advantage of that data. If a company do not use a login system, which allows only authorised users to view such confidential data by using usernames and passwords then they would be more vulnerable to unauthorised users therefore they allow their confidential data to be viewable to unauthorised users. For example if a travel agent lose their data it is very dangerous for the company as their data contains personal details on their customers and all their prices for their tickets also the ticket details of future booking which is all very vital data. ...read more.

Middle

Also you would allow viruses to damage your computer system. If you do not use spam protection for your email inbox then you may receive unwanted junk mail. This junk mail can be offensive material such as pornography including both text and images. These things can promote sexism, violence and personal abuse. If you do not use anti-virus software such as Norton anti-virus or MacAfee anti-virus when using the internet then you are dangerously putting yourself at risks. This is because viruses are spread mainly on the Internet and where there is no kind of anti-virus protection, the virus can spread to that computer system. By doing so it can corrupt the file on your computer, stop programs not functioning properly or at all and can damage the whole computer system. If you do not use firewall software when using the Internet then you would allow unauthorised users such as hackers or intruders to hack into computer systems. This would result in the hackers to view all your confidential data and it would allow them to edit the data or permanently delete the data. ...read more.

Conclusion

Describe measures to protect against Internet security threats. There are two types of software's to protect you from Internet security threats; these are anti-virus software and firewall software. Anti-virus software helps to protect your computer from viruses while using the Internet by finding a virus if it occurs onto your computer and automatically destroying the virus itself or it would let you know before doing so. Anti-virus software also scans for any types of viruses on your computer system and deletes them if it has found any. If a virus has already affected your computer then anti-virus software can fix it by recovering the infected program or file. Examples of anti-virus software are Norton Anti-Virus and MacAfee Anti-Virus. Firewall software helps to protect your computer from hackers and intruders while you are using the Internet. If a hacker were to hack into your computer system, firewall software would prevent him or her from doing so by blocking the network from him or her and your computer. Examples of firewall software are Norton Firewall and MacAfee Firewall protection. By using both anti-virus protection and a firewall software your computer is protected from the danger the Internet has to offer. Unit 3 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Marked by a teacher

    The systems development life cycle (SDLC) is a conceptual model used in project management ...

    3 star(s)

    Prototyping runs the spectrum from advanced computer modelling to writing it down on the back of a napkin. Actually, something in between usually works best, and using paper-based prototypes in a facilitated group design session was the actual approach for this financial services effort.

  2. Peer reviewed

    information systems assignment 2

    4 star(s)

    Marketers use data mining to help them pin point and focus their attention on certain segments of the market to sell to, and in some cases black hat hackers can use data mining to steal and scam thousands of people.

  1. Control Unit, Memory Unit, and Arithmetic Logic Unit. The CPU or Central Processing ...

    e) OCR (optical character reader). This is a device that reads characters and can distinguish between the different characters in a given character set. It works by comparing the shape of a scanned character with a library of shapes that it is intended that it should recognise.

  2. Smart Card System

    The Java Cryptography Extension (JCE) extends the JCA API to include encryption and key exchange. Together, it and the JCA provide a complete, platform-independent cryptography API. The JCE will be provided in a separate release because it is not currently exportable outside the United States The Java Cryptography Architecture (JCA)

  1. With diagrams compare and contrast the relative advantages and disadvantages of digital transmission over ...

    Twisted pair can be used for analogue signalling (e.g. voice), but it is mostly used with digital signalling in computer networks. Repeaters (digital signalling) are required every 2-3 km; amplifiers (analogue signalling) every 5-6 km. The twisted pairs are commonly used for 10 Mbps Ethernet systems; 100 Mbps Ethernet is possible for distances up to 330 feet.

  2. Hardware and Software

    Inkjets work out to be more expensive than laser printers. Task One (M1) Software Packages 1. Corel Paint Shop Pro Photo X2 2. Adobe PhotoShop 8.0 CS Win I have chosen two of the software, which I think are good for creating, capturing and manipulation graphic images.

  1. Ways of Promoting a Website

    To do so I will make a link that when clicked, stored my link in to the users favourites, thus there will never be any trouble of the user finding his or her way back to my site. An example of this can be seen on the following page.

  2. Computing Module 3 Writeup

    Then MsgBox ("Examiner number has to be entered") Validate = False Exit Function End If If txtExaminerNo.Text < 100000 Then MsgBox ("Centre number must be between 100000 and 999999") Validate = False Exit Function End If If txtExaminerNo.Text > 999999 Then MsgBox ("Centre number must be between 100000 and 999999")

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work