• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Digital Security Within the Workplace

Extracts from this document...

Introduction

Digital security within the workplace If you don't want anyone to hack into your computer you are better off being protected by adding a password to protect your files. Files can easily be accessed by anyone and this could lead to your files getting deleted, important files can get hacked into and may result in you not accessing them again. Security is really important this doesn't matter were it could be at home or work, your computer or laptop should always be protected. Data misuse and unauthorised transfer or copying Data misuse falls into the category of accessing someone else's computer System with intentions to commit an offence such as stealing data, without their permission. Unauthorized copying occurs when the exclusive right to reproduce protected work is violated, which is generally when a copy is made from a protected file of work without the copyright owner's permission. The computer Misuse Act doesn't allow somebody else to access a computer by using someone else's identification. Other things include changing, copying, deleting or moving a programme. You cannot also run a program or obtain any data even though it's not for personal gain. Hacking to someone else's account through their password is also listed in the Computer Misuse Act. ...read more.

Middle

To prevent this form happening you shouldn't tell anyone were you live because they might end up stalking you unless you know the person then it's different, you shouldn't meet up with them this could lead to kidnapping and finally you could install a blocker which will block unsafe chat room sites. Virus protection A virus is really harmful it could lead to you loosing important files and folders which you can't retrieve back and can also destroy your hard drive. A virus may be transmitted on disks and through networks, on-line services, and also through the Internet. The ways that a virus could do this is through an email which is the most common way. When you open an email from an unrecognized sender and has an attachment with it you shouldn't open it because theirs a high risk of a virus getting attached to the file. By having a good anti virus protection on the computer, your computer will always be protected from viruses attacking your computer which is a helpful way to ensure there are no viruses on the computer. Viruses appear in many forms such as pop up boxes which then you block through your settings by clicking on block all pop ups. ...read more.

Conclusion

* Install programs such as firewall keep hackers and viruses out of the computer system * Put passwords on documents and it should contain numbers and letters so it is hard to hack into your network * Make sure passwords are unique and should change them every 90 days or so * Not open emails from unknown senders * Anti-Virus protection programs will help prevent a hacker from sending viruses etc. * Make sure computers are updated regularly, if they' not then there is a risk which could lead to viruses and computer hacking People always attempt to hack into your computer system; some of the things they do are trying and hack into your computer to collect information. The simple is to just password protect your file by listening to the advice at the top. People also try and use your internet connection to download files, if you are not using your internet connection then you should just switch it of by disconnecting it. This way no one will be able to hack into it. Pornography Is in appropriate to watch or go on pornography in the workplace, as it cab be tracked down by the administrator and also could lead to viruses and then a loss of work can occur. So during the workplace you shouldn't access such content. These are some of the websites I used to get my information: * http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev1.shtml * http://www.detroiteronline.com/index.php?option=com_content&view=article&id=799%3f * http://legal-dictionary.thefreedictionary.com/Unauthorized+copying ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

3 star(s)

Response to the question

In summary, the report is an 'Pass'. There is a clear basic understanding of a number of security issues when using the computer and internet. However some of these are quite vague and the student may need to research a ...

Read full review

Response to the question

In summary, the report is an 'Pass'. There is a clear basic understanding of a number of security issues when using the computer and internet. However some of these are quite vague and the student may need to research a little more, to add further detail to the report. The student doesn't understand the term 'hack' and this is used in a number of area's incorrectly. Hacking is an important aspect of security, and this is important to be used correctly within the report. The report needs to be accurate, otherwise this isn't valid and won't achieve high marks. The report does show a detailed screenshot and annotations explaining how a user is able to prevent access to files by setting up a password. In addition the report goes further, and explains and 'Do's' and 'Don't's of choosing a reasonable password to use.

Level of analysis

The section 'Email and abuse in the chat room' describes how someone could be abused using these websites and a number of disadvantages to the user. This answer is developed, as this describes the potential dangers to the person if the person where to access such a website. The section 'Virus Protection' is quite weak in terms of detail. There clearly showing a basic understanding, however the student could give more examples of the types of virus people may suffer with and how this could be transmitted to the user. The section 'Hacking' does lack understanding. The section should be re-written after the student has research what the term is and how to prevent this. At this stage this isn't correct.

Quality of writing

The opening sentence is false, as the report states 'If you don’t want anyone to hack into your computer you are better off being protected by adding a password to protect your files.'. However this should be something on the lines of 'It's important to add a password to prevent unlawful access to a number of important files'. The term 'hack' is not defined and this is used in the wrong context.


Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by danielbeal 19/02/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Marked by a teacher

    ICT Evaluation of my materials produced for a "Get Moving" health campaign.

    4 star(s)

    The purpose of the spread sheet model is to provide the user with an action plan on what they need to do, to become healthier and more active. On the final version of the model it was recommended I use more than one colour as I used different shades of

  2. Uses of ICT.

    Mobile phones are affected the Data Protection Act. When you sign up with a contract phone all your information is stored in a computer and this must be backed up and also the owner must follow the eight principles. Telephones; - are used to communicate with people by a voice conversation.

  1. The Impact of ICT on society.

    The only way to possibly get any action done against this is to contact the service provider who may choose to ban that person from using this tool completely. However this doesn't always stop the abuse as may people just use a different service provider.

  2. I will describe a short formal document using order form as one of my ...

    There are different types of newspapers which are produced on different times; the daily newspaper is made every day. The Sunday daily newspaper tends to be far more expensive. Most daily newspapers are produced every morning. Example of national newspapers: * Telegraph The * The Observer * The Daily Mail

  1. SK-II has already established as a leading brand within its' skin-care industry. By empowering ...

    Picture 3 clipped from the SK-II UK web site. 4.4 Products Information (Content): * Standardized information is delivered to all web-surfers, indifferent to their sex, age and needs. * Use electronic brochure-like information to attract customers Picture 4 clipped from the SK-II UK web site.

  2. There are five types of communication:Written- letters, memoranda, reports, noticesOral- telephone, face-to-face, meetingsVisual- charts, ...

    * The fax machine can miss sheets * The message is not confidential Electronic mail (e-mail) Electronic mail involves sending data, messages, graphics and files to users of another computer network. Each person has an e-mail address. Messages can be word-processed beforehand.

  1. using ICT to communicate

    address, phone number and website. These are given so customers can get in touch if they have any problem, queries or questions. Target Audience: The target audience for this brochure are people who have existing business or people that are going to start a business.

  2. Get Up,Get Moving Evaluation of my multimedia promotions of a fitness campaign.

    out in an organised way- personal details, activity plan, predicted weight and menu. The purpose of the spread sheet model is to provide the user with an action plan on what they need to do, to become healthier and more active.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work