• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Organisational Systems Security

Extracts from this document...

Introduction

Unit15 - Organisational System security Security policies Guideline updating of security procedures and scheduling of security audits Updating current measures of security e.g. anti-virus and firewall to keep protection at its highest. Making sure buildings and systems aren't being accessed by unauthorised people e.g. with the use of id cards and usernames with passwords. Also reviewing current measures of security in order to make sure the current system is reliable and finding ways to improve it. codes of conduct e.g. email usage Establishing the rules for using the email system within the organisation e.g. business related enquiries only, not for personal use, e.g. not opening attachments from unknown sources e.g. opening of .exe files. internet usage policy Internet should be used for only business related tasks. E.g. research. Nothing off topic e.g. social networking, games, restricting downloads etc. surveillance and monitoring policies Installing security devices such as CCTV, to protect the building and data e.g. by making sure employees don't damage equipment etc. risk management; Carrying out risk assessments and providing employees with updated health and safety guidelines. ...read more.

Middle

It is used in combination with activity logs to make it easier to see whose done what. ensuring compliance including disciplinary procedures We should make sure all employees are aware of the consequences of not sticking to the company policies. e.g. informing them of disciplinary steps if a serious breach of company policy is committed e.g. by using verbal warnings, written warnings and finally the sack . training and communicating with staff as to their responsibilities We should prepare training to teach current staff new skills in order to complete their jobs and update them on policy changes so they know how/if it may affect their role in the business. We should also communicate with our employees;to help them to understand their roles and responsibilities as well as improve morale and security. Task 2 Policy Description email usage policy This policy will help keep systems secure by disallowing employees to download files from unknown source and .exe files which will keep the systems secure by preventing viruses, keyloggers etc from getting on the system. ...read more.

Conclusion

After decrypting the certificate and matching it with web servers details it will complete the connection, only if both sets of details match. Usage Uses for encryption techniques such SSL is to transmit data safely over a network to prevent them being intercepted, but if they are intercepted to stop people from reading the data. E.g. uses include encrypting bank details when purchasing or viewing services such as online banking. Caesar cipher Explanation/operation A Caesar cipher is a form of encryption that works by replacing fixed letters of the alphabet with an alphabet that has been moved down a few places, e.g. Fixed: ABCDEFGHIJKLMNOPQRSTUVWXYZ Cipher: HIJKLMNOPQRSTUVWXYZABCDEFG An example of an 'encrypted' message will be; Encrypted message; PMSSV Original message: Hello Usage Caesar cipher may be used when communicating with other people so only those who know where the alphabet is aligned to the fixed alphabet will know how to decrypt it for example: the army may use it during war time to make sure; if the enemy gets a hold of the encrypted message, they will not be able to determine what the message says immediately. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    staff records to be archived; * Staff records can be located and amended in less than 1 minute; * Staff records can be located and deleted in less than 30 seconds; * The age field will be automatically calculated from the Date of Birth field and today's date; * System

  2. Peer reviewed

    Computer Crime

    5 star(s)

    * Animal Management * Supply Chain Management * Asset Management (retail assets, Libraries, etc) * Hospital Operating Room - keep track of surgery tools * Contactless Payment * And more Because the RFID tagging system is becoming so popular and widely used, concerns and controversy are beginning to rise as to how much privacy the holder has.

  1. Information: G061 - Systems and Communication

    Ongoing costs include repair, maintenance, network management, etc. Software licenses need to be purchased, including operating systems, utilities, etc. There may also be training costs to train users how to use the software. Consumables are items that get used, including paper and printer ink/toner. Personnel costs are the costs related to people working in the organisation.

  2. Expert Systems are used in all sectors of organizations to help aid users with ...

    It had a very powerful problem-solving program with the capability of performing over 600 distinct mathematical operations. It then evolved into a widely used commercial product. Then in 1972 came MYCIN, which was the work of Edward Shortliffe. It was the best known medical system.

  1. What is networking?

    Summary of a NOS & How it Works: A Network Operating System controls the network in the workplace; this control entails many different tasks at different layers in the layered architecture. For example, a major function of an NOS is to provide security to all the PCs but still allow easy access for legitimate users.

  2. Review articles that take a complex approach to new organisational structures and proposed several ...

    inappropriate for organisation studies to settle prematurely into a normal science mindset because organisations are enormously complex (Daft and Lewin - 1990). What they meant is that the behaviour of complex system is surprising and hard to predict. That is why the use of complexity theories can be appropriate.

  1. Database Coursework on a Rental System: Design

    Customer: Customer ID, Forename, Surname, Street Address, Town, County, Nationality, Sex, Postcode, Telephone Number, Mobile Number, E-mail Address, Date of Birth, Age, Date of Membership. Customer_Rental: Customer ID, Rental ID, Vehicle ID, Date Rented Out, Number of Days, Return ID, Date Returned, Staff ID, Forename, Surname, Street Address, Town, County,

  2. Communication & Employability Skills for IT. OCR Cambridge Technicals Unit 1 LO1-P1

    Business Skills 5 This is important as the IT manager may need to attend meetings relating to financial crises or any other business matters as he will be trying to run his own company better. This includes the using the computers for work and using other important skills which represent the business.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work