• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Assignment 1 unit 7 Security Assessment Report (.coursework.info)

Extracts from this document...


Assignment 1 unit 7: Security Assessment Report Contents An Introduction Email Task 1: Types of threats to your security with suggested improvements(P1) I. Malicious damage II. Human Error III. Technical Failures IV. Internal threats V. External threats VI. eCommerce VII. General Suggested improvements Task 2: Types of threats to your physical security with suggested improvements(P2) I. Biometrics II. Physical security Task 3: Types of threas to your digital security with suggested improvements. (P3, M1) I. Software and Network security 1) Firewalls 2) Call Back 3) Handshaking 4) Use of Backups 5) Audit Logs 6) Fire wall 7) Configuration Task 4: Explanation of encryption and other security methods for your data in transit(M2) Task 5: Protection methods for unforeseen natural disasters or disruptions. (D1) An Introduction This is Unit 7 Assignment 1. In this assignment I will be explaining and recommending to the boss of BuyItAll.com my security recommendations which are outlined above. Email. I have theoretically sent an email to the boss of BuyItAll.com before I wrote this Report, to advise him of some immediate security measures he should take, e.g., change of passwords because if I sent a Report in 2 or 3 weeks time, anyone could have been accessing the system in the meantime. Task 1: Types of threats to your security with suggested improvements(P1) Malicious damage T he possible threats to the security of BuyItAll.com may include malware, such as viruses (which include things like Trojan Horses), which are little programmes similar to apps which can delete crucial files in your computer and/or computer registry . Another threat to your computer system may be Spyware which is a computer programme enabling the creator to receive data from your computer about your computer and most commonly, your personal details and your businesses' private details. These programmes may have been uploaded on to your computer by the disgruntled ex-employee maliciously. Someone could have uploaded some malware onto a website and when you go onto this website, you will also download the malware. ...read more.


There should be efficient junk-mail filters on your email to avoid any viruses coming into your system by email. Task 2: Types of threats to your physical security with suggested improvements(P2) Biometrics These are mechanical security measures that detect fingerprints, gait recognition and iris detection, etc. Be aware that these methods are not foolproof! There are people out there who spend every day trying to beat these systems. Physical security These are security measures like locks and bolts on doors and windows. Security guards and dogs could be employed, and burglar alarms such as motion sensors, noise detection and other sorts of alarms; CCTV cameras and Smart cameras to be deployed inside and outside the building. The doors to the server should be locked and a security guard should be positioned outside the door. With the server's hardrives being locked in place and for higher security measures, having a vault door in front of the server, and having the access keys 12 metres apart, and operated simultaneously by two separate employees, would ensure greater (but not foolproof) security. You could invest in a disaster resistant room with fire resistant tiles, and some way of filtering flood or excess water, and some way of cooling things down if the air conditioning breaks down to avoid the server being flooded and/or cooked, for your server to resist things like terrorist attacks, e.g., bombs and/or the unlikely but still possible event of a tornado. All these physical security systems could help to make your business secure. Describe how software and network security measures can help keep systems and data secure. (P3, M1) Software and Network Security The first suggestion I would make would be buy or download your software from reputable retailers. Unlicensed and cracked software could also have incorporated Malware in the cracking code and also, you could be in trouble with the law if you use unlicensed software. ...read more.


or not work altogether, so it is highly advisable to have some sort of anti-virus software installed, keeping systems and data secure. use of passwords Passwords are crucial to deter any opportunistic data thieves. If everybody has a strong password, these types of thieves will be stopped. When signing up for a Google mail account, they have an indicator next to the password, they have a scale next to the password selected, to indicate whether this is a weak to strong password. Generally, weak passwords are 1 - 6, your dog's name, your wife's names, or any similar name, important dates like your birthday. These are considered weak passwords as they can easily be guessed. Strong passwords are usually an alphanumeric combination of upper and lower case letters, for instance, GIRfufr57fjy, keep systems and data secure. levels of access to data The levels of access is crucial to your systems and data so not just any employee can access or change files. Only authorised personnel, i.e. only administrators and you, can change system files, keeping systems and data secure. Disaster recovery Disaster recovery is if something disastrous happens, you can then keep damage limited . Backups are an example of how it is possible to prevent the loss of your data. The use of Backups are essential to your business, so that if your hard drive fails you will need to get a new hard drive and if you neglected to back up your computer, all your data is lost. So backups are essential to keep data secure. If there is no disaster recovery, in the event of a flood or fire, your data may well be lost. Whole system recovery If a complete disaster happens, you need to replace your whole system. You need to use your backups from another building, buy new servers and put the backups onto the new servers. ?? ?? ?? ?? Joe Alt Monday, 04 July 2011 Assignment 1 unit 7 Security Assessment Report Page 1 of 8 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    the theory was fairly basic, it provided some foundation and framework in the subject that could be expanded upon. I have gained much more knowledge and experience from last year's AS level ICT that will be of help to me this year.

  2. Marked by a teacher

    Assignment A: Analysis of Transactional Website

    3 star(s)

    ski wear, hiking, camping etc. The newsletters contain the latest news about the company and all of their latest deals that they have to offer to their customers; this entices the customer reading the newsletter to take a look into what deals they have got on and may even buy

  1. Marked by a teacher

    Evaluation. In this unit of controlled assessment I have developed a website using multimedia ...

    I made us of this technique in both graphics to give a spray-paint texture to the graphic. I also used the cropping tool to eliminate parts of the graphic which were not needed. This tool was used in my second graphic to get rid of extra blank spaces which were not required.

  2. Marked by a teacher

    Application Software

    Integrated Search Engine Links ? First appear on toolbars. Most browsers now include this as a standard feature that users can customize. Search Engines search engines are essential tools that allow WWW users to find relevant information in the vast arena of the internet by entering keywords or phrases that form the basis of a database query.

  1. ict as level coursework

    All details filled out should automatically transfer to this customer details spread sheet. 9 When a new customer is registered ensure that they have a unique customer number. Create a new customer The customer will have a unique customer number. 10 Ensure that 10% discount is deduced from end total.

  2. I have been asked to write a report on current working practice and I ...

    To make sure that the product is exactly same as client brief, they match the product with design specification constantly because if the product does not matches the specification at the end they have to go back and self evaluate to see where they have make mistake and is it possible to put extra time to make changes.

  1. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    work long hours or even come in the weekends, the employees must be able to accept this and work efficiently without any hesitation as this will show the employer that the employee is dedicated to the work. In some cases the employees may not get paid, they may have to be flexible and accept the fact.

  2. Discuss security issues in e-commerce.

    When a transaction is made on a site that has SSL, the process means it has to encrypt and decrypt the data. This can all make the connection slower. Getting SSL for a business can be expensive because the service providers need to pay for things such as maintenance.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work