• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Unit 3- Business Information Systems.

Extracts from this document...

Introduction

Provide an analysis of the reasons why it is important to keep data safe and secure. It is important to keep data safe and secure because if a company do not do so, then the data is vulnerable to other people and companies. This is very dangerous for the company as that data may be financial data or their customer's data. If another company steals the data then they are likely to know the important details of the Company they have stolen the data from and may take advantage of that data. If a company do not use a login system, which allows only authorised users to view such confidential data by using usernames and passwords then they would be more vulnerable to unauthorised users therefore they allow their confidential data to be viewable to unauthorised users. For example if a travel agent lose their data it is very dangerous for the company as their data contains personal details on their customers and all their prices for their tickets also the ticket details of future booking which is all very vital data. ...read more.

Middle

Also you would allow viruses to damage your computer system. If you do not use spam protection for your email inbox then you may receive unwanted junk mail. This junk mail can be offensive material such as pornography including both text and images. These things can promote sexism, violence and personal abuse. If you do not use anti-virus software such as Norton anti-virus or MacAfee anti-virus when using the internet then you are dangerously putting yourself at risks. This is because viruses are spread mainly on the Internet and where there is no kind of anti-virus protection, the virus can spread to that computer system. By doing so it can corrupt the file on your computer, stop programs not functioning properly or at all and can damage the whole computer system. If you do not use firewall software when using the Internet then you would allow unauthorised users such as hackers or intruders to hack into computer systems. This would result in the hackers to view all your confidential data and it would allow them to edit the data or permanently delete the data. ...read more.

Conclusion

Describe measures to protect against Internet security threats. There are two types of software's to protect you from Internet security threats; these are anti-virus software and firewall software. Anti-virus software helps to protect your computer from viruses while using the Internet by finding a virus if it occurs onto your computer and automatically destroying the virus itself or it would let you know before doing so. Anti-virus software also scans for any types of viruses on your computer system and deletes them if it has found any. If a virus has already affected your computer then anti-virus software can fix it by recovering the infected program or file. Examples of anti-virus software are Norton Anti-Virus and MacAfee Anti-Virus. Firewall software helps to protect your computer from hackers and intruders while you are using the Internet. If a hacker were to hack into your computer system, firewall software would prevent him or her from doing so by blocking the network from him or her and your computer. Examples of firewall software are Norton Firewall and MacAfee Firewall protection. By using both anti-virus protection and a firewall software your computer is protected from the danger the Internet has to offer. Unit 3 ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our AS and A Level Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related AS and A Level Computer Science essays

  1. Peer reviewed

    information systems assignment 2

    4 star(s)

    Spreadsheets are mainly used to store statistical values and data but can be used for text based information also. Spreadsheets are good to use in a supermarket rather than other tools due to many reasons which the other tools cannot do.

  2. Ways of Promoting a Website

    the Netscape corporation although is a registered trademark of the Sun Microsystems group. Java script may be implemented in many ways; however the most common is to embed it within the code of the HTML. So what are the uses of the JavaScript language and why should we use them?

  1. Security Issues of E-Commerce

    But why these two pieces of software. Well the fact that theses viruses and spy ware can trace your every move and copy all the details you enter in to your machine we can see that if using the computer for e-commerce or online banking that there is a massive security risk.

  2. Computing Module 3 Writeup

    If Examiner Number has been left blank or is out of the specified range, then another message box would pop up displaying the error. For entering data to the Add Examiner Form, I used the following validation: Private Sub Form_Load()

  1. Hardware and Software

    With each new product on the market showing improvements in performance, usability, and output quality. Limitations: 1. Slower than a laser printer. 2. An Inkjet printer is a way to have color printing available. The color is sprayed onto the paper.

  2. Firewall Protection

    It is commonly used mainly for various adware (and adware is a program that is supported by presenting advertisements to the user), and that during their installation process, they install an independent program which we shall call "adbot". The adbot runs independently even if the hosting adware is not running,

  1. Smart Card System

    Furthermore, machines connected to any of these networks can communicate to any other network through gateways supplied by the network vendor. 1.6. Data packet transmission Data packet transmission consists of a series of handshaking sequences where the sending side of the end node/repeater local port, point-to-point connection makes a request and the other side acknowledges the request.

  2. Flexible Architectures in Communication Security Application

    3DES has a key size of 112 bits, block size of 64 bits, and 48 rounds. Rijndael has key size of 128 bits, block size of 128 bits, and Lisa Wu Page 16 4/22/01 10 rounds. The remaining kernels use at least 128 bits of key data.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work