• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Organisational Systems Security

Extracts from this document...

Introduction

Unit15 - Organisational System security Security policies Guideline updating of security procedures and scheduling of security audits Updating current measures of security e.g. anti-virus and firewall to keep protection at its highest. Making sure buildings and systems aren't being accessed by unauthorised people e.g. with the use of id cards and usernames with passwords. Also reviewing current measures of security in order to make sure the current system is reliable and finding ways to improve it. codes of conduct e.g. email usage Establishing the rules for using the email system within the organisation e.g. business related enquiries only, not for personal use, e.g. not opening attachments from unknown sources e.g. opening of .exe files. internet usage policy Internet should be used for only business related tasks. E.g. research. Nothing off topic e.g. social networking, games, restricting downloads etc. surveillance and monitoring policies Installing security devices such as CCTV, to protect the building and data e.g. by making sure employees don't damage equipment etc. risk management; Carrying out risk assessments and providing employees with updated health and safety guidelines. ...read more.

Middle

It is used in combination with activity logs to make it easier to see whose done what. ensuring compliance including disciplinary procedures We should make sure all employees are aware of the consequences of not sticking to the company policies. e.g. informing them of disciplinary steps if a serious breach of company policy is committed e.g. by using verbal warnings, written warnings and finally the sack . training and communicating with staff as to their responsibilities We should prepare training to teach current staff new skills in order to complete their jobs and update them on policy changes so they know how/if it may affect their role in the business. We should also communicate with our employees;to help them to understand their roles and responsibilities as well as improve morale and security. Task 2 Policy Description email usage policy This policy will help keep systems secure by disallowing employees to download files from unknown source and .exe files which will keep the systems secure by preventing viruses, keyloggers etc from getting on the system. ...read more.

Conclusion

After decrypting the certificate and matching it with web servers details it will complete the connection, only if both sets of details match. Usage Uses for encryption techniques such SSL is to transmit data safely over a network to prevent them being intercepted, but if they are intercepted to stop people from reading the data. E.g. uses include encrypting bank details when purchasing or viewing services such as online banking. Caesar cipher Explanation/operation A Caesar cipher is a form of encryption that works by replacing fixed letters of the alphabet with an alphabet that has been moved down a few places, e.g. Fixed: ABCDEFGHIJKLMNOPQRSTUVWXYZ Cipher: HIJKLMNOPQRSTUVWXYZABCDEFG An example of an 'encrypted' message will be; Encrypted message; PMSSV Original message: Hello Usage Caesar cipher may be used when communicating with other people so only those who know where the alphabet is aligned to the fixed alphabet will know how to decrypt it for example: the army may use it during war time to make sure; if the enemy gets a hold of the encrypted message, they will not be able to determine what the message says immediately. ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Information Systems and Communication section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Information Systems and Communication essays

  1. Marked by a teacher

    Database Coursework on a Vehicle Rental System: Analysis

    5 star(s)

    Processes: - A formula will be used that will multiply each mile travelled by a fixed price in order to charge a monetary value per mile the customer has travelled during their last rental. Performance Criteria I shall now set out a list of objectives that will be used to evaluate the system when it is completed.

  2. Peer reviewed

    Computer Crime

    5 star(s)

    * Espionage of Major Companies and Governments * And more With new emerging technologies being released, becoming more versatile, and individuals placing more personal information in the hands of them, they must be equipped with better security. If not personal information may as well be handed to those seeking it.

  1. The Impact of Mobile Phones on social Interaction

    The focus group showed that it is a combination of the cost factor and impersonal feature that is associated with SMS that has made it such a popular tool for interaction amongst peer groups. Some of these results were supported by the findings of Taylor and Harper of Surrey University

  2. Energy Conversion (EC) Systems

    First Law There is an extensive property, internal energy (U), such that a change in its value is for a system not in motion by the difference between the heating (Q) done to the system and the work (W) done by the system during any change of state.

  1. This research that I've done will discuss about the effectiveness of the Light Railway ...

    Completion of the Southern Sector Interstate Bus Complex will make the station even busier.15 Masjid Jamek Station is an important interchange between the PUTRA and STAR LRTs, which are now under the same management and have introduced a monthly season ticket allowing the holder unlimited travel on both systems.

  2. Review articles that take a complex approach to new organisational structures and proposed several ...

    companies have now to move away from monolithic and rigid organisational design which were geared for repetitive transactions and routine activities (Bahrami - 1992). Complexity theories will see these businesses not as closed and rigid but as new open systems (Anderson - 1999), which exchange resources with the environment and

  1. Data Processing Task. Mr Peters, the man who runs this particular Samsung store ...

    Validation BusinessID Auto number Long Integer A unique one or two digit to represent a business Unique Primary Key BusinessName Text 20 The name of the business Presence Check Address1 Text 20 The first line address of the business Presence check Town/City Text 20 The town or city the business

  2. BTEC IT Organisational Systems Security - outline of potential threats to an online business.

    The consequences of theft could be dire for your organisation as the result could be long-term financial damage, commercial damage, the inability to track business, increased costs due to the need to replace the stolen equipment or even loss of business due to loss or service or a loss in customer confidence.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work