• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Assignment 1 unit 7 Security Assessment Report (.coursework.info)

Extracts from this document...


Assignment 1 unit 7: Security Assessment Report Contents An Introduction Email Task 1: Types of threats to your security with suggested improvements(P1) I. Malicious damage II. Human Error III. Technical Failures IV. Internal threats V. External threats VI. eCommerce VII. General Suggested improvements Task 2: Types of threats to your physical security with suggested improvements(P2) I. Biometrics II. Physical security Task 3: Types of threas to your digital security with suggested improvements. (P3, M1) I. Software and Network security 1) Firewalls 2) Call Back 3) Handshaking 4) Use of Backups 5) Audit Logs 6) Fire wall 7) Configuration Task 4: Explanation of encryption and other security methods for your data in transit(M2) Task 5: Protection methods for unforeseen natural disasters or disruptions. (D1) An Introduction This is Unit 7 Assignment 1. In this assignment I will be explaining and recommending to the boss of BuyItAll.com my security recommendations which are outlined above. Email. I have theoretically sent an email to the boss of BuyItAll.com before I wrote this Report, to advise him of some immediate security measures he should take, e.g., change of passwords because if I sent a Report in 2 or 3 weeks time, anyone could have been accessing the system in the meantime. Task 1: Types of threats to your security with suggested improvements(P1) Malicious damage T he possible threats to the security of BuyItAll.com may include malware, such as viruses (which include things like Trojan Horses), which are little programmes similar to apps which can delete crucial files in your computer and/or computer registry . Another threat to your computer system may be Spyware which is a computer programme enabling the creator to receive data from your computer about your computer and most commonly, your personal details and your businesses' private details. These programmes may have been uploaded on to your computer by the disgruntled ex-employee maliciously. Someone could have uploaded some malware onto a website and when you go onto this website, you will also download the malware. ...read more.


There should be efficient junk-mail filters on your email to avoid any viruses coming into your system by email. Task 2: Types of threats to your physical security with suggested improvements(P2) Biometrics These are mechanical security measures that detect fingerprints, gait recognition and iris detection, etc. Be aware that these methods are not foolproof! There are people out there who spend every day trying to beat these systems. Physical security These are security measures like locks and bolts on doors and windows. Security guards and dogs could be employed, and burglar alarms such as motion sensors, noise detection and other sorts of alarms; CCTV cameras and Smart cameras to be deployed inside and outside the building. The doors to the server should be locked and a security guard should be positioned outside the door. With the server's hardrives being locked in place and for higher security measures, having a vault door in front of the server, and having the access keys 12 metres apart, and operated simultaneously by two separate employees, would ensure greater (but not foolproof) security. You could invest in a disaster resistant room with fire resistant tiles, and some way of filtering flood or excess water, and some way of cooling things down if the air conditioning breaks down to avoid the server being flooded and/or cooked, for your server to resist things like terrorist attacks, e.g., bombs and/or the unlikely but still possible event of a tornado. All these physical security systems could help to make your business secure. Describe how software and network security measures can help keep systems and data secure. (P3, M1) Software and Network Security The first suggestion I would make would be buy or download your software from reputable retailers. Unlicensed and cracked software could also have incorporated Malware in the cracking code and also, you could be in trouble with the law if you use unlicensed software. ...read more.


or not work altogether, so it is highly advisable to have some sort of anti-virus software installed, keeping systems and data secure. use of passwords Passwords are crucial to deter any opportunistic data thieves. If everybody has a strong password, these types of thieves will be stopped. When signing up for a Google mail account, they have an indicator next to the password, they have a scale next to the password selected, to indicate whether this is a weak to strong password. Generally, weak passwords are 1 - 6, your dog's name, your wife's names, or any similar name, important dates like your birthday. These are considered weak passwords as they can easily be guessed. Strong passwords are usually an alphanumeric combination of upper and lower case letters, for instance, GIRfufr57fjy, keep systems and data secure. levels of access to data The levels of access is crucial to your systems and data so not just any employee can access or change files. Only authorised personnel, i.e. only administrators and you, can change system files, keeping systems and data secure. Disaster recovery Disaster recovery is if something disastrous happens, you can then keep damage limited . Backups are an example of how it is possible to prevent the loss of your data. The use of Backups are essential to your business, so that if your hard drive fails you will need to get a new hard drive and if you neglected to back up your computer, all your data is lost. So backups are essential to keep data secure. If there is no disaster recovery, in the event of a flood or fire, your data may well be lost. Whole system recovery If a complete disaster happens, you need to replace your whole system. You need to use your backups from another building, buy new servers and put the backups onto the new servers. ?? ?? ?? ?? Joe Alt Monday, 04 July 2011 Assignment 1 unit 7 Security Assessment Report Page 1 of 8 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    The structured interview consists of a series of pre-prepared, precisely defined questions. It is the rigidity and inflexibility of the structured interview that is both its greatest strength and greatest weakness. On one hand, it is from this structure and order that objective precise data will be able to be

  2. Marked by a teacher

    Investigating a Transactional Website (www.latestdvd9.com)

    4 star(s)

    For this reason the website needs to be able to authenticate the identity of each customer, so in case of a fraud they would be able to chase the customer and prosecute him. Below you can see what it says on the first page, where customers are asked for their

  1. Marked by a teacher

    Assignment A: Analysis of Transactional Website

    3 star(s)

    cheap in cost but can still be of a high quality and look professional and it may persuade more customers to registering (because only members receive them) and therefore the company have more members to capture and use information on.

  2. Marked by a teacher

    Evaluation. In this unit of controlled assessment I have developed a website using multimedia ...

    The sound sets the mood of the website thus also makes it seem rather appealing. Moreover, I ensured that I used suitable file extensions of my files as well as optimisation. This is so that my website would be able to be displayed on the web without taking a long time to download.

  1. Marked by a teacher

    Application Software

    Sites that aggregate content ? many popular sites have very little content of their own but will compile data from many other sites and present them in one place. Examples include: 1. Reference sites such as answers.com. a search of this site for ice cream, for example, will produce

  2. Feasibility Report

    using the new software, in order for the company to benefit, although yet again this takes time and money. o There is only a timeline of 20 weeks for introducing the new system for the Perfect Pie Company. o 20% of the �20,000 budget must be kept for essential maintenance on the new system, for example, repairs, faults, bugs, crashes.

  1. ICT AS-Level Coursework

    which will help the clerk to produce a receipt which will in turn be given to the customer. 2. I will need to make a database of the whole stockist and its product ID. 3. I will have to place the correct sizes with the correct product ID's.

  2. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    work long hours or even come in the weekends, the employees must be able to accept this and work efficiently without any hesitation as this will show the employer that the employee is dedicated to the work. In some cases the employees may not get paid, they may have to be flexible and accept the fact.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work