• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Digital Security Within the Workplace

Extracts from this document...

Introduction

Digital security within the workplace If you don't want anyone to hack into your computer you are better off being protected by adding a password to protect your files. Files can easily be accessed by anyone and this could lead to your files getting deleted, important files can get hacked into and may result in you not accessing them again. Security is really important this doesn't matter were it could be at home or work, your computer or laptop should always be protected. Data misuse and unauthorised transfer or copying Data misuse falls into the category of accessing someone else's computer System with intentions to commit an offence such as stealing data, without their permission. Unauthorized copying occurs when the exclusive right to reproduce protected work is violated, which is generally when a copy is made from a protected file of work without the copyright owner's permission. The computer Misuse Act doesn't allow somebody else to access a computer by using someone else's identification. Other things include changing, copying, deleting or moving a programme. You cannot also run a program or obtain any data even though it's not for personal gain. Hacking to someone else's account through their password is also listed in the Computer Misuse Act. ...read more.

Middle

To prevent this form happening you shouldn't tell anyone were you live because they might end up stalking you unless you know the person then it's different, you shouldn't meet up with them this could lead to kidnapping and finally you could install a blocker which will block unsafe chat room sites. Virus protection A virus is really harmful it could lead to you loosing important files and folders which you can't retrieve back and can also destroy your hard drive. A virus may be transmitted on disks and through networks, on-line services, and also through the Internet. The ways that a virus could do this is through an email which is the most common way. When you open an email from an unrecognized sender and has an attachment with it you shouldn't open it because theirs a high risk of a virus getting attached to the file. By having a good anti virus protection on the computer, your computer will always be protected from viruses attacking your computer which is a helpful way to ensure there are no viruses on the computer. Viruses appear in many forms such as pop up boxes which then you block through your settings by clicking on block all pop ups. ...read more.

Conclusion

* Install programs such as firewall keep hackers and viruses out of the computer system * Put passwords on documents and it should contain numbers and letters so it is hard to hack into your network * Make sure passwords are unique and should change them every 90 days or so * Not open emails from unknown senders * Anti-Virus protection programs will help prevent a hacker from sending viruses etc. * Make sure computers are updated regularly, if they' not then there is a risk which could lead to viruses and computer hacking People always attempt to hack into your computer system; some of the things they do are trying and hack into your computer to collect information. The simple is to just password protect your file by listening to the advice at the top. People also try and use your internet connection to download files, if you are not using your internet connection then you should just switch it of by disconnecting it. This way no one will be able to hack into it. Pornography Is in appropriate to watch or go on pornography in the workplace, as it cab be tracked down by the administrator and also could lead to viruses and then a loss of work can occur. So during the workplace you shouldn't access such content. These are some of the websites I used to get my information: * http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev1.shtml * http://www.detroiteronline.com/index.php?option=com_content&view=article&id=799%3f * http://legal-dictionary.thefreedictionary.com/Unauthorized+copying ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Here's what a star student thought of this essay

3 star(s)

Response to the question

In summary, the report is an 'Pass'. There is a clear basic understanding of a number of security issues when using the computer and internet. However some of these are quite vague and the student may need to research a ...

Read full review

Response to the question

In summary, the report is an 'Pass'. There is a clear basic understanding of a number of security issues when using the computer and internet. However some of these are quite vague and the student may need to research a little more, to add further detail to the report. The student doesn't understand the term 'hack' and this is used in a number of area's incorrectly. Hacking is an important aspect of security, and this is important to be used correctly within the report. The report needs to be accurate, otherwise this isn't valid and won't achieve high marks. The report does show a detailed screenshot and annotations explaining how a user is able to prevent access to files by setting up a password. In addition the report goes further, and explains and 'Do's' and 'Don't's of choosing a reasonable password to use.

Level of analysis

The section 'Email and abuse in the chat room' describes how someone could be abused using these websites and a number of disadvantages to the user. This answer is developed, as this describes the potential dangers to the person if the person where to access such a website. The section 'Virus Protection' is quite weak in terms of detail. There clearly showing a basic understanding, however the student could give more examples of the types of virus people may suffer with and how this could be transmitted to the user. The section 'Hacking' does lack understanding. The section should be re-written after the student has research what the term is and how to prevent this. At this stage this isn't correct.

Quality of writing

The opening sentence is false, as the report states 'If you don’t want anyone to hack into your computer you are better off being protected by adding a password to protect your files.'. However this should be something on the lines of 'It's important to add a password to prevent unlawful access to a number of important files'. The term 'hack' is not defined and this is used in the wrong context.


Did you find this review helpful? Join our team of reviewers and help other students learn

Reviewed by danielbeal 19/02/2012

Read less
Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Communications essays

  1. Marked by a teacher

    ICT Evaluation of my materials produced for a "Get Moving" health campaign.

    4 star(s)

    The purpose of the spread sheet model is to provide the user with an action plan on what they need to do, to become healthier and more active. On the final version of the model it was recommended I use more than one colour as I used different shades of

  2. Peer reviewed

    Email and Email Security.

    4 star(s)

    Also, malicious code might be distributed in amusing or enticing programs. Secure Your Communications email Once your gateway is secure, the next step is securing your communications beyond the gateway to include your external users, partners, clients and others. IronMail achieves this with our Mail-VPN feature.

  1. Peer reviewed

    Internet banking security

    3 star(s)

    This layer can sometimes vary between banks, but a common method is the use of transaction numbers, which are for one use only. Another tactic is the use of two passwords, only random parts of which are entered as the user starts banking.

  2. A report on how ICT affects me as an individual, and other members of ...

    It is also useful for people who may have difficulties holding a mouse. Advantages of these are that they are easy, effective and can be used by anyone. Disadvantages are that they are limited and may be expensive. If someone has a problem with controlling their hand's movement then it's not very useful.

  1. Uses of ICT.

    You can easily send files and images. Disadvantages include that the e-mail isn't personal. People can attach viruses which can be downloaded without knowing. To use e-mail an internet connection is needed. Junk mail known as SPAM is a big problem but can be controlled using special settings with things like AOL mail controls.

  2. Information Security.

    Written messages are less prone to error, and since the courier need not know the message, but can destroy it in an emergency, there could be better security. Yet written messages can be concrete evidence of conspiracy or 'spying whereas a carrier of a spoken message might escape unsuspected.

  1. The Impact of ICT on society.

    Although day and night isn't really distinguishable on the internet as one person's day such as in the UK may be another persons night say in the USA. Although this phenomenon isn't with out its faults and people are often complaining about the following things to which the internet ahs been blamed for.

  2. Free essay

    Impact of ICT in Community

    For that she uses a colour teller which says the colour when you touch to your clothes. Mary needs a lot of time to complete a task as she can't see. In addition in her free time she like's watching Television, Mary have an Audio speech in the movies so it tells the person what's happening in the movie.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work