• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Reduce Damage to organisations

Free essay example:

In order to prevent or minimize damage to a particular organisation, some security precautions need to be implemented and below I am going to name and explain how each of them work:- 

Stealing Intellectual Property

Stealing intellectual property is basically when someone steals images from your website or other information and uses it on their own site without your permission.

This is known as breaking the copyright law and works with logos as well and new ideas for new products as well.

This can for example include; patents and trademarks as well as domain names. If a person is caught they can be given a significant amount of fine and eventually a prison sentence as well.

 The fine is £5000 for access and unlimited fine for modifying data.

Denial Of Service Attack

Denial of service attacks is basically when a particular person restricts access to a web page or network.

It basically stops legitimate information to get through to the server and stop legitimate service to respond.

This will make customers go to other websites and the company that has been attacked by this lose crucial customers and a significant amount of money as their website is not responding.

This is done by a particular person sending lots of blank server request which overloads the server/system and it stops getting a request.

Halting E-commerce Transactions

 If for instance a particular person hacks into a website they can basically stop transactions so that the organisations lose customers and money.

They can also play around with the website and remove products that are on for sale by a particular organisation or even re-price them to ridiculously high price or even lower price.

This can cause a lot of problems for both organisation and customers.

If the security is removed or changed the hackers will be able to intercept customers card details.

If the card details were to be intercepted by a hacker they will be able to commit fraud crimes which can cause a lot of problems for both the organisation and the customers.  

Preventing Technologies

One of the technologies that can be used to protect an organisations’ computers is by simply using firewalls.

By using firewalls it will prevent intruders from getting into the organisations’ computers.

It works by checking the filters that are coming through the network or internet and if they are malicious it will block them from entering your computer but if they aren’t dangerous it will let it through to the computers.

Another technology that can be implemented by an organisation is antivirus, malware removal tools and spywares.

By using the above software’s an organisation can prevent viruses from getting into the computers, as viruses are used by people to hack into the computers and are used more to cause damage to the computers.

By using antivirus software such as Norton Anti-Virus and scanning regular the organisation can catch and remove viruses from the computers.

Malware can basically corrupt files on the computer so if the organisation don't have a malware remover it will lose important files and if they are not backed up the organisation can lose money and customers as well.

By using malware remover and scanning regularly, a company can simply search for dangerous files on the computers that will corrupt the file and remove them.

Spyware is used to steal personal details such as online shopping details (credit/debit card, online email username and password details. Spyware can also log people’s password and send them to the hackers.

By using spyware remover and scanning regularly the company can remove spyware from the computers and keep it safe from being controlled by the hackers.

As for website protection a particular company can make their website read-only and disable right clicks on their website so no one can steal information and images from the website. Another way is to put copyright marks on the website as well as implementing the Hypertext Transfer Protocol Secure (HTTPS)

A company can also implement a CCTV in the server from where all the crucial information is stored. And perhaps have security locks on the doors. Only authorized staff should have permission to enter the zone.

Another technology an organisation can implement is swipe card door technology.

An exception is Microsoft Vista which is designed to prevent external attacks and is self-protecting and healing.

Disaster Recovery

Disaster recoveries are basically methods which can be put in place to recover from any disaster such as virus attack, fire, earth quakes, explosions, flood, hardware failure, power failure and sabotage.  

As you can see below are the main ways to recover from disasters:-

  1. It is crucial to make regular backup of  the work and place the backups in a remote location where no one knows where it is and it is far away from the building so if the building goes on fire nothing harm will happen to the data. A good alternative is to upload the data to an external server which is located in a different place/building.
  1. Data should be backed up regularly and normally at the end of the working day.
  1. A particular organisation can invest in a backup server which could be located in a different country. All the data could then be backed up electronically.
  1. One backup a day is not enough. It would be too risky for a company to backup once. So twice or more a day is necessary.
  1. Another alternative is investing in some special designed CDs for backups or special made storage devices. A lot of data can be backed up with CDs and storage devices. Depending on how many of these the company invest in, they could save a lot of money by using this method.

If all of the steps above are taken into consideration the company will save itself from disasters recover as recovering data can cost a significant amount of money. It would cost around £600 for the data to be recovered which not 100% guaranteed.

A company can set up a system which allows real time copy which can be swapped if necessary.

This student written piece of work is one of many that can be found in our AS and A Level Policy, Strategy & Systems section.

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Related AS and A Level ICT Skills and Knowledge Essays

See our best essays

Related AS and A Level Policy, Strategy & Systems essays

  1. Peer reviewed

    Legislation regulating E-Commerce

    3 star(s)

    There are three main acts related to this: 1. the trades description act 1968 2. The consumer protection act 1987 3. The price marking order 2004 The main areas of concern trading standard institute are counterfeit goods, the sale of alcohol and tobacco to under aged persons and etc.

  2. Threats to Organisations and Systems. Describe the countermeasures available to an organisation that ...

    Many USBs can corrupt themselves; certain USB styles are more in danger of braking down. USBs such as the thin mini/micro range of USBs and from my past experience these are very useless for harboring data because of the size and unreliability of it.

  1. How a particular organisation can take advantage of IT developments

    customers who shop regular such as a voucher to spend in stores when they go to the actual shop.

  2. implementation of an ITC system

    The sound card will just be a integrated one as well, and will have line in, line out and microphone ports (the standard) it will be a "Realtek AC' 97", as this is a cheap sound card which is all that is necessary, for what they would use it for.

  1. Formal Specification, Verification, and Automatic Test Generation of ATM Routing Protocol: PNNI

    The Flooding procedures are the necessary extensions to the database synchronization protocol in order to keep all routing information within a single peer group current. The Database Synchronization protocol is started with the event AddPort, which is generated when the first link between two neighboring nodes running the Hello protocol enters the state, Two Way Inside.

  2. Produce a report for the Managing Director of Animal World Magazine outlining different ways ...

    spread quickly across the network to computers * Security fears, hackers might hack into personal details of the company or unauthorised access. * Setting up network is expensive because you need cables, interface cards, server etc * If the cable or interface breaks the whole network will be effected or

  1. ICT in Organisations.

    This means that all unsaved files are saved to the hard disk. In the Graduate School of Education there are 4 small servers, and these all do different jobs. There are 2 domain controllers. The primary one is called Charlie and the backup is called Bravo.

  2. Intrusions from the Unknown: Importance of Network Security in Today's Environment and Security Issues ...

    Caesar Cipher is a simple technique but many electronic devices continuously alternate displacement of the plain text, which can produce very complex encrypted code. A simple example of the Caesar Cipher would be taking the word "NETWORKING" and displacing the letters by 3, which would give you "PGVYQTMKPI".

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work