• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Digital Security Within the Workplace

Extracts from this document...

Introduction

Digital security within the workplace If you don't want anyone to hack into your computer you are better off being protected by adding a password to protect your files. Files can easily be accessed by anyone and this could lead to your files getting deleted, important files can get hacked into and may result in you not accessing them again. Security is really important this doesn't matter were it could be at home or work, your computer or laptop should always be protected. Data misuse and unauthorised transfer or copying Data misuse falls into the category of accessing someone else's computer System with intentions to commit an offence such as stealing data, without their permission. Unauthorized copying occurs when the exclusive right to reproduce protected work is violated, which is generally when a copy is made from a protected file of work without the copyright owner's permission. The computer Misuse Act doesn't allow somebody else to access a computer by using someone else's identification. Other things include changing, copying, deleting or moving a programme. You cannot also run a program or obtain any data even though it's not for personal gain. Hacking to someone else's account through their password is also listed in the Computer Misuse Act. ...read more.

Middle

To prevent this form happening you shouldn't tell anyone were you live because they might end up stalking you unless you know the person then it's different, you shouldn't meet up with them this could lead to kidnapping and finally you could install a blocker which will block unsafe chat room sites. Virus protection A virus is really harmful it could lead to you loosing important files and folders which you can't retrieve back and can also destroy your hard drive. A virus may be transmitted on disks and through networks, on-line services, and also through the Internet. The ways that a virus could do this is through an email which is the most common way. When you open an email from an unrecognized sender and has an attachment with it you shouldn't open it because theirs a high risk of a virus getting attached to the file. By having a good anti virus protection on the computer, your computer will always be protected from viruses attacking your computer which is a helpful way to ensure there are no viruses on the computer. Viruses appear in many forms such as pop up boxes which then you block through your settings by clicking on block all pop ups. ...read more.

Conclusion

* Install programs such as firewall keep hackers and viruses out of the computer system * Put passwords on documents and it should contain numbers and letters so it is hard to hack into your network * Make sure passwords are unique and should change them every 90 days or so * Not open emails from unknown senders * Anti-Virus protection programs will help prevent a hacker from sending viruses etc. * Make sure computers are updated regularly, if they' not then there is a risk which could lead to viruses and computer hacking People always attempt to hack into your computer system; some of the things they do are trying and hack into your computer to collect information. The simple is to just password protect your file by listening to the advice at the top. People also try and use your internet connection to download files, if you are not using your internet connection then you should just switch it of by disconnecting it. This way no one will be able to hack into it. Pornography Is in appropriate to watch or go on pornography in the workplace, as it cab be tracked down by the administrator and also could lead to viruses and then a loss of work can occur. So during the workplace you shouldn't access such content. These are some of the websites I used to get my information: * http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev1.shtml * http://www.detroiteronline.com/index.php?option=com_content&view=article&id=799%3f * http://legal-dictionary.thefreedictionary.com/Unauthorized+copying ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

3 star(s)

Response to the question

In summary, the report is an 'Pass'. There is a clear basic understanding of a number of security issues when using the computer and internet. However some of these are quite vague and the student may need to research a ...

Read full review

Response to the question

In summary, the report is an 'Pass'. There is a clear basic understanding of a number of security issues when using the computer and internet. However some of these are quite vague and the student may need to research a little more, to add further detail to the report. The student doesn't understand the term 'hack' and this is used in a number of area's incorrectly. Hacking is an important aspect of security, and this is important to be used correctly within the report. The report needs to be accurate, otherwise this isn't valid and won't achieve high marks. The report does show a detailed screenshot and annotations explaining how a user is able to prevent access to files by setting up a password. In addition the report goes further, and explains and 'Do's' and 'Don't's of choosing a reasonable password to use.

Level of analysis

The section 'Email and abuse in the chat room' describes how someone could be abused using these websites and a number of disadvantages to the user. This answer is developed, as this describes the potential dangers to the person if the person where to access such a website. The section 'Virus Protection' is quite weak in terms of detail. There clearly showing a basic understanding, however the student could give more examples of the types of virus people may suffer with and how this could be transmitted to the user. The section 'Hacking' does lack understanding. The section should be re-written after the student has research what the term is and how to prevent this. At this stage this isn't correct.

Quality of writing

The opening sentence is false, as the report states 'If you don’t want anyone to hack into your computer you are better off being protected by adding a password to protect your files.'. However this should be something on the lines of 'It's important to add a password to prevent unlawful access to a number of important files'. The term 'hack' is not defined and this is used in the wrong context.


Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by danielbeal 19/02/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Marked by a teacher

    ICT Evaluation of my materials produced for a "Get Moving" health campaign.

    4 star(s)

    The purpose of the spread sheet model is to provide the user with an action plan on what they need to do, to become healthier and more active. On the final version of the model it was recommended I use more than one colour as I used different shades of

  2. Peer reviewed

    Email and Email Security.

    4 star(s)

    Also, malicious code might be distributed in amusing or enticing programs. Secure Your Communications email Once your gateway is secure, the next step is securing your communications beyond the gateway to include your external users, partners, clients and others. IronMail achieves this with our Mail-VPN feature.

  1. OCR GCSE Business & Communication Task 7 Report

    This law is frequently needed to protect owners work and files and insure they are kept private and within high confidence. It also controls how the data is used towards the owner and how it is passed onwards. This protection law has to follow key issues to insure user's files are safe and appropriately used.

  2. A report on how ICT affects me as an individual, and other members of ...

    When copying anything the user has to be aware of any copyright on the images or documents, because this could otherwise cause the company fines and other forfeits. Use of ICT by Special Needs People ICT technologies used by a person with special needs are things like - " Touch

  1. The Impact of ICT on society.

    The most the can do is simply complain to their Service provider or the messaging service which the person has abused them through. The police can deal with it but its rare and there isn't much what they can do as if it is from various countries it is a

  2. Uses of ICT.

    This is controlled by the e-mailing system because it has a limit to the file size. Therefore any larger files cannot be sent. Computers; - used for processing word documents like essays and coursework pages. Computers can also be used to create graphs and charts from inputted data.

  1. Information Security.

    Written messages are less prone to error, and since the courier need not know the message, but can destroy it in an emergency, there could be better security. Yet written messages can be concrete evidence of conspiracy or 'spying whereas a carrier of a spoken message might escape unsuspected.

  2. Report On Satellite Communications

    In 1962. It was a medium earth orbit satellite intended to assist high-speed telephone signals, but some of the problematic aspects of a single MEO in space were learned by the scientists soon. It only provided transatlantic telephone signals for 20 minutes of each approximately 2.5 hours orbit.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work