• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month
Page
  1. 1
    1
  2. 2
    2
  3. 3
    3
  4. 4
    4
  5. 5
    5
  6. 6
    6
  7. 7
    7
  8. 8
    8
  9. 9
    9
  10. 10
    10
  11. 11
    11
  12. 12
    12
  13. 13
    13
  14. 14
    14
  • Level: GCSE
  • Subject: ICT
  • Word count: 2751

Security of ICT systems

Extracts from this document...

Introduction

Security of ICT Systems- Keep safe! ASSIGNMENT OBJECTIVES In this assignment you are to provide evidence that you can: * Understand potential breaches of security and the need to protect data in ICT-based systems * Know how to protect the data of individuals and organisations using appropriate security measures. TASK INTRODUCTION You have been asked to review the security of the school's network as some intrusions to the system have recently been made. You need to present your work in a report format. TASK 1 (P1) In the first part of your report, explain and describe using examples the types of security breaches, their possible causes (why) and impact (consequences). You need to find at least four examples that can be out of school context (shop, bank...) Shop Security breaches Causes Impact Legislation ICT system unauthorized removal of data accidental, malicious, system issues loss of confidence, loss of profit and theft. Data Protection Act 1998 standalone PCs Bank Security breaches Causes Impact Legislation ICT system leading to identity theft accidental, malicious, negligent; system issues, hacking due to downtime, data loss, loss of confidence, identity theft, loss of money. Crime and Security Act 2001 internet enabled systems Doctor surgery Security breaches Causes Impact Legislation ICT system damage to physical systems incorrect installation, configuration, operation; viruses, spyware physical loss of equipment; security audits; contingency plans and disaster recovery Crime and Security Act 2001 networked PCs Home Security breaches Causes Impact Legislation ICT system unauthorized removal of data email viruses, worms, macro viruses, Trojans contingency plans and disaster recovery Computer Misuse Act 1990 standalone PCs TASK 2 (P2) ...read more.

Middle

It received royal assent and came into force on 14 December 2001. Many of its measures are not specifically related to terrorism, and a Parliamentary committee was critical of the swift timetable for such a long Bill including non emergency measures. On 16 December 2004 the Law Lords ruled that Part 4 was incompatible with the European Convention on Human Rights, but under the terms of the Human Rights Act 1998 it remained in force. It has since been replaced by the Prevention of Terrorism Act 2005. Ref: http://en.wikipedia.org/wiki/Anti-terrorism,_Crime_and_Security_Act_2001 * Schools should keep data safe by having a password * Internet security TASK 3 (P3, M1, D1) The third part of your report will be about your recommendation as an expert. You will need to: List the measures you would put in place to protect data in a general context (not only school). (P3) (What would you do to protect data in School i.e. Passwords on systems, LAN School?, CCTV etc) For this task it may be better for you to create a table: Measures put in place Description of measure/examples: Picture/diagram Virus protection Viruses such as Trojans can be prevented from entering the computer by making sure there is a firewall in place and a suitable internet security such as McAfee. Ref: http://edge.fatwallet.com/static/i/deals/mcafee-total-protection-2010-3user.jpg Spyware and adware protection Unwanted spyware and adware can be avoided by buying up to date internet security e.g. Norton 360 or Kaspersky. It can also be avoided by hiding your IP address, using peer block or simply not file sharing from sources you don't trust. ...read more.

Conclusion

Passwords and access codes Passwords and access codes are commonplace. It is likely that you will have a username and password to log on to your school or college systems. A password or access code is a sequence of characters, numbers or a combination of characters and numbers that a user keys in to gain access to a specific computer or network. This code should be secret (not given to anyone else) and should be something that another person is unlikely to be able to guess. Task 4 (M2) In the fourth part, explain with examples how an individual in an organisation can contribute to the security of data. There are numerous ways how an individual in an organisation such as Microsoft the security of data. Firstly he can set a password to all the computer programs contain delicate information, they access at home. The individual must also make sure to change their password on a regular basis, perhaps, once a week or every forth night. They should also be careful not to give passwords away to anyone who does not work to the organisation even if they are a family member. The should not misplace their key passes, as this should let it end up in the wrong hands and possibly cause the company some damage financial, etc. Private information about the companies, e.g. bills and memos should also be shredded if not needed using a diamond shredder or kept locked up in a case space where others can not access, preferably locked with a key pad. ?? ?? ?? ?? 1 Unit 17 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Hardware section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE Hardware essays

  1. Different types of technology How I use ICT at home and at school

    If I'm having a problem with my computer in which I have trouble solving, I can simply get a friend to help me out via remote assistance. There are also other features and activities such as the various games involved.

  2. Use of IT in schools

    The principal school in the foundation, Mill Hill, has 3 computer laboratories, as well as computers in the Art and DT departments, and some in the library. The school, as would be expected, is on a Client/Server network, which every student and member of staff has access to.

  1. Explain the difference between primary and secondary sources of data, with examples.

    or the situation from their point of view and join in with what they do. During participant observation the researcher would try to understand the motives and meanings of the person they were studying, they are trying to gain a deeper understanding of the persons life, their beliefs, activities of the group and where and how they live.

  2. ICT Report 2b: ICT in Organisations

    Boots also have a website, which requires image-manipulating software such as Adobe Photoshop and HTML-code rendering web design software such as Macromedia Dreamweaver for it to be made and maintained. Boots essentially uses technology to aid them in their daily running of the business, using different aspects for internal communication between departments, external communications with customers and managerial offices.

  1. GCSE ICT Coursework Booklet

    1 2 3 4 1. The shop logo is positioned in the top left hand corner on every screen and is written in an eye-catching style. 2. The layout is easy to read, modern and inviting. There are bold headings that illustrate the point clearly and effectively. 3. It is easy to navigate the site.

  2. How is ICT used in schools and what are the effects?

    Please, do not circulate this writing elsewhere on the internet. Anybody found doing so will be permanently banned. Printers (laser and colour)coca car secacaw orca cak inca foca ca. Available to teachers and students, although some schools may have to restrict printing to save on resources which is an environmental

  1. Creating a computer system for a video rental shop

    The system should take approximately 4 months to complete and has the proposed delivery date of the 30th of April. It will come complete with a progress report, a system guide and details on the testing completed. Database Design The Database contains FOUR entities: * Staff * Videos * Members

  2. The impact of ICT on a person with special/particular needs

    Sarah's motorised wheelchair is the Beatle Powerchair. This wheelchair is easily manoeuvrable and user-friendly due to its easy controls via a joystick and menu. As quoted from the site 'simplyhealth.co.uk', 'The Handicare Beatle electric wheelchair is specially designed for excellent in and outdoor manoeuvrability giving you the freedom to enjoy more in life.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work