Organisation Security Issues

Organisational Security Issues - Security Issues Computer misuse act (1990): The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities, such as hacking into other people's systems, misusing software, or helping a person to gain access to protected files of someone else's computer. http://goo.gl/T26HQ Examples: Spanners 'R' us cannot edit or "modify" any of the computer settings as this would be classed as hacking, this is when a file needed to operate a computer has been edited to function differently. When a file has been changed the user could be in threat of their personal information stolen which would relate to identity theft. When a customer changes or edits any of the factory or "default" software Spanners 'R' us would have to look into the programs before fixing the computer, if the computer is found to have been edited then Spanners 'R' us would refuse to fix the computer system. Data Protection Act (1998): The Data Protection Act 1998 is a United Kingdom Act of Parliament which defines UK law on the processing of data on identifiable living people. It is the main piece of legislation that governs the protection of personal data in the UK. Although the Act itself does not mention privacy, it was enacted to bring UK law into line with the European Directive of 1995 which required Member States to protect people's fundamental

  • Word count: 922
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Intrusions from the Unknown: Importance of Network Security in Today's Environment and Security Issues Associated with Networks.

Intrusions from the Unknown: Importance of Network Security in Today's Environment and Security Issues Associated with Networks. A network can be defined as "A group of two or more computer systems linked together". The main reason for doing this is to enable any 2 or more computers to share each other's resources and thus this is a feature of all networks. Security in this context can be defined as "the act of protecting information (data files) from being access by unauthorised individuals or groups". There are three common types of network set up which are defined by there topology. Figure 1 illustrates the difference between Star, Bus and Ring networks which are used in network types as LAN, WAN, WLAN etc. A network runs on protocols, which define a common set of rules and signals that computers on the network use to communicate. A network can be isolated and independent such as a small home-area network (HAN) but once a network is connected to another network it can be defined as an Internet. Networks are frequently thought of as two different systems due to the fact that they can be access internally as well externally. Both methods give rise to different security issues and should be tackled differently by the network administration. Internal users in most cases are over looked as threats to security as they can cause malicious and unintentional damage to a

  • Word count: 4645
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Illegal music downloads. This Essay will treat and analyze main points of advantages and disadvantages of unauthorized media files sharing; Government's aspiration to put down a breach of copyright; the influence of free and unlimited music downloads on

INTRODUCTION Nowadays, music has become an integral part in the life of modern man. For many years people have been expressing their feelings using music or the words expressed by the appropriate tune. Music has developed over several decades: many professional artists had appeared in that period, whose records were accessed to everyone in any music store in the forms of LPs, then cassettes, then CDs... It can be spend hours on discussing the development of the music industry, which has become one of the most profitable business areas. However, during the development of this sphere in the world of business has appeared a set of new, various industries, one of which is the Internet Network. With the advent of the global information network, the music industry began to suffer losses, because the Internet network with high speed began to develop piracy, unauthorized (illegal) media files sharing. This Essay will treat and analyze main points of advantages and disadvantages of unauthorized media files sharing; Government's aspiration to put down a breach of copyright; the influence of free and unlimited music downloads on various spheres of activities, such as industries of recording, marketing and modern technologies; piracy impact on the job market and musicians' income; the effect of copyright infringement on the level of economic growth of the country. Nowadays almost

  • Word count: 1630
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Building Local Area Networks

Ray Nimmo HND 2 Building Local Area Networks Assessment 3 - Outcome 2 Scenario 2: Analysis: Summary of requirements SweetCo Ltd wishes to computerise their stock control system in their warehouse. Their intention is to connect portable barcode readers (via USB) to laptop PC's. They plan to use these to track incoming and outgoing stock as well as stock movements within their warehouse. These PC's will then connect to a small local server using wireless links. Current provision The company has already purchased some of the hardware for this task: * Six PIII laptops - Windows 98 - 128MB RAM - 2 No. Type II PCMCIA slots. * Barcode readers with appropriate software. * Server unit - Windows 2000 server - 10/100mbps PCI NIC. The warehouse is a rectangular room measuring 50m long by 30m wide and 4m high. The stock shelving consists mainly of wooden racks with a few of them having steel frames. On the shelving, the stock is mainly in the form of cardboard boxes and plastic wrappings. There is an unused cupboard at one corner of the warehouse; this would be ideal for the placement of the server as it has adequate lighting and power sockets. - Drawing 1 - Existing warehouse layout - Proposal for solution The company only needs to purchase a minimal amount of hardware to implement this network as they have the majority of the requirements already. All that is needed is

  • Word count: 2994
  • Level: AS and A Level
  • Subject: ICT
Access this essay

A computer virus is much the same as a human virus, but whereas flu affects the human body, the wonderfully named viruses Antics, stoned, Notepad A, michealangelo all affect the computer in various ways

VIRUSES A computer virus is much the same as a human virus, but whereas flu affects the human body, the wonderfully named viruses Antics, stoned, Notepad A, michealangelo all affect the computer in various ways human can carry a virus without even knowing they have it (measles has an incubation period of a couple of weeks), a piece of computer equipment such as a floppy dice may similarly be carrying a virus without knowing. Unfortunately, the virus carrier may maliciously pass the virus on, knowing that there is an infection. A virus is a computer program that is intended to copy itself to other programs and causes disruption to the infected equipment. There are different types of virus. The Trojan horse is a virus which hides inside another program, a time bomb is one which is activated on a certain date, a logic bamboo is one activated by a certain condition Su as file being accessed 10 times, there are literally thousands of viruses around, some have been written maliciously. Others were designed to be ' nice', such as displaying the message Happy Christmas, but then destroyed information as a side effect. Doctors in the computer world are other programs, known as anti-virus software, or virus killing software. Anti-virus software can search disks oft viruses, then disinfect the disk if a virus us found. Gatekeepers exist which will scan any newly accessed information

  • Word count: 375
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Crime and crime prevention

Crime and crime prevention Introduction Internet can let people access to the worldwide market place and buy some stuff they want through Internet (example EBAY) and the product will come within one week. Instead of going library-getting information they want, people can also use the Internet and access to World Wide library and get lots of information from it. People can also play the online games and chat with friends on Internet. Internet can allow us to access entertainment easily, which include music, film, movies and games. It was on 24/7, so we can access it at any convenience time. The technology has changed our life, because it has made all the things easier because we can just buying goods at home without going outside. We also can get a cheaper stuff we want from the Internet by compare the price. But some people is making crime with the technology, so the identity theft are beginning to put people off shopping and banking online. As a survey get by a software firm show that 17% of people said they had stopped banking online while 13% had abandoned web shopping. The reason is they are worried about some people would get their card details and stolen money from it. Because the term refers to the practice of creating look-alike websites, often of banks and other financial institutions, and duping people into visiting them and giving out personal information such

  • Word count: 1453
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Computer Networks.

Element 4.3 Computer Networks 2. Types of Networks A LAN (local area network) is a collection of computers connected together over a small area, usually a single building or site (e.g. a school). If a school was to have a LAN it would own all the equipment and be able to run the network as it sees fit. If changes need to be made to the network, such as adding new terminals, it will be relatively easy and cheap. A WAN (wide area network) consists of computers connected over a large area using telecommunications equipment, such as telephone or satellite communications links. A school could have a LAN which is connected to other schools around the country (or world) to form a WAN. WANs are more sophisticated than LANs as the operator has to deal with telecommunications companies and doesn't own all the equipment. Wires between one LAN and another are owned supplied by a telecommunications service provider, each of which has it's own regulations and service charges. Two schools with a LAN could be connected using two modems and appropriate software on each machine together with a public telephone line. This method is fairly cheap to set up with no need for much extra equipment, but data transfer is slow and the phone bills can be high. As it is a public telephone line it is not very secure and so vulnerable to hackers. Renting a dedicated leased line from a

  • Word count: 3617
  • Level: AS and A Level
  • Subject: ICT
Access this essay

Benefits of a Network

Benefits of a Network There are two types of networks LAN (local area network). LAN networks on the other hand usually only cover small areas of one to several KM. Although this may seem like a large area it is still considered small or local. WAN (wide area network) networks are characterized by the distance the transverse and the fact that they will always be attached to a common carrier of some type, either the good old AT&T or one of the more that 100 common carriers available in any metropolitan area. These are the networks that you find in schools and offices for example our school network, which is a LAN network covers a large area but is contained on one site. There may be many computers on the network and even several servers but they are always on the one site. The servers serve up information and programs as people working at the network stations request them. It is common to share printers and other output devices, so that saves the organisation money. The software used on the network is also shared. An organisation has to pay a network license fee for the software but this still works out cheaper than buying software for each individual machine. It also allows email, which is the way that much day-to-day communication takes place. But it's not all good. The organisation has to pay technical staff to maintain the network. User accounts need to be added and

  • Word count: 504
  • Level: AS and A Level
  • Subject: ICT
Access this essay

What are the advantages and disadvantages For B.m.c.s in using a LAN rather than separate P.c's?

What are the advantages and disadvantages For B.m.c.s in using a LAN rather than separate P.c's? There are many advantages and disadvantages to using a Local area network rather than separate p.c's, I my report I aim to identify why schools and other originations use a local area network rather than separate P.c's. A LAN is used in school to connect all pc's to the main server, which then can connect, for example pc 1 to pc 10, No communication lines are needed to create the LAN as cabling is used, the cabling used to connect the pc's are coaxial cables or fibre optic cables. Mainly Coaxial cables are used in one building that won't experience much interference, as they are relatively cheap when compared to the other alternative. Fibre optic cabling is used when the LAN may experience interference such as over a car park or public road. The advantages of using a LAN rather than having separate stand-alone computers in school are that: * There are no expensive telephone bills due to not using telecommunication lines to link the computers together. * Hardware devices such as printers and scanners are shared which saves a large amount of money. * Software only has to be brought once but the school or organisation must hold a licence to run it on more than one computer. This saves a large amount of money as to buy software for each computer in the school would

  • Word count: 564
  • Level: AS and A Level
  • Subject: ICT
Access this essay

The Sullivan's matrix report

Information Strategy "Organizations are increasingly able to gather and process information from a variety of new sources" (Ferguson et al., 2005 p51) 'Sullivan's matrix' introduces different ways to classify the IT/IS environment of an organisation. Within this matrix, there are four environments: Traditional, Opportunistic, Complex and Backbone. The idea of this report is to describe how the IS/IT environment of Inditex fits into Sullivan's matrix. According to Ward & Peppard (2002) organisations with a traditional IT/IS environment have a highly centralised control of their IT resources. "IS is not critical to the business" and IT is solely used to improve efficiency on a system-by-system basis. McAfee (2004) raises many points in his article to suggest that the IT/IS of Inditex fits into this Traditional environment. Inditex see IT as merely an enabler for their business. McAfee (2004) confirms this theory as he states that "The role of IT, then, is to support the process" (McAfee, 2004). Ward & Peppard state that within a Traditional environment, IT is simply used to support business processes and to improve the efficiency of the organisation. Another point which supports the theory is that Inditex have an excellent IT and business alignment. "business goals always shape the company's use of technology, never vice versa" (McAfee, 2004). This portrays Inditex

  • Word count: 1404
  • Level: AS and A Level
  • Subject: ICT
Access this essay