Preview

Assignment

Powerful Essays
Open Document
Open Document
3821 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Assignment
Programme: BTEC Higher National Diploma (HND) in Computing and Systems Development
Unit Number and Title: 48 IT Security Management
Assignment Ref. Number: 1.0-IT Security Management

Module Tutor: Murshed Thakur

Email: Murshed.edu@gmail.com Learner 's Name: Md. Rezwanul Karim

Learner 's ID: 60158

Introduction: Computer technology is the technology which made every sector more powerful to use information. When computer technology is processing the information for organization or person or for anything else than it is named as information technology(IT).This technology helped us to avoid mountains of pages and files. Organisation using this technology can make the profit double than the manual system.

Now a days most of the standard organisation depends on IT to maintain their business stream. So huge number of individuals cannot think without information technology. so it should have a good management system. Information technology play vital role in the world of communication, business, education, medicines etc…

IT security management is a process that confirm the right out come from a specific sources and ensure to preserve all properties of sources. Moreover IT security Is a complete management system which is related to analysis risk ,threat, mitigation and to ensure maximum outcome of an organisation.

ASSIGNMENT
P1
In an organisation there will always be threat of IT security. My organisation is about security threats. In security you get all kinds of threats such as viruses, spam, malware and network monitoring, lost emails, data theft, lost data, time wasting and employees.
Viruses: A virus can copy everything on your computer/laptop for example; it can copy all your personal files like images, music, videos and documents etc. Viruses can spread rapidly and damage the machine causing it to crash. Whilst having a



References: Alexander D et al – Information Security Management Principles (BCS, 2008) ISBN-13: 978-1902505909 Beekman G – Computer Confluence Complete: and Student CD (Prentice Hall, 2005) ISBN 1405835796

You May Also Find These Documents Helpful

  • Better Essays

    Corporation Tech IT will manage risk by identifying, evaluating, controlling, and mitigating vulnerabilities that are a potential threat to the data and information systems under its control.…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    Is4231 Week 5

    • 3436 Words
    • 14 Pages

    Evaluate the internal and external factors that influence the activities and organization of an information security program List and describe the typical job titles and functions performed…

    • 3436 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Assignment

    • 287 Words
    • 2 Pages

    The paper must be at least two pages in length and formatted according to APA style. Cite your resources in text and on the reference page. For information regarding APA samples and tutorials, visit the Ashford Writing Center, within the Learning Resources tab on the left navigation…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    assignment

    • 721 Words
    • 3 Pages

    The central location of the distribution includes mean, median and mode. As illustrated above, the mean number, median number and mode number of the distribution of installation times are 21.54,22 and 22. There are little differences among the three numbers which means that the shape of the distribution is nearly symmetric.…

    • 721 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    MGT220

    • 3391 Words
    • 11 Pages

    With information technology management, a manager must have the skills to accomplish results by communicating job expectations; planning, monitoring, and appraising job results; coaching, counseling, and disciplining employees; initiating, coordinating, and enforcing systems, policies, and procedures. A manager maintains staff by recruiting, selecting, orienting, and training employees; maintaining a safe and secure work environment; developing personal growth opportunities. With this, he or she maintains organization 's effectiveness and efficiency by defining, delivering, and supporting strategic plans for implementing information technologies. The IT manager directs technological research by studying organization goals, strategies, practices, and user projects, and with this completes projects by coordinating resources and timetables with user departments and data center. He or she verifies the application results by conducting system audits of technologies implemented. With this, he or she preserves assets by implementing disaster recovery and back-up procedures and information security and control structures. The manager recommends information technology strategies, policies, and procedures by evaluating organization outcomes; identifying problems; evaluating trends; anticipating requirements. They then maintain…

    • 3391 Words
    • 11 Pages
    Powerful Essays
  • Powerful Essays

    assignment

    • 1220 Words
    • 5 Pages

    Your company president tells you not to hire any gay or lesbian employees to work as part of his office staff because it would make him uncomfortable.…

    • 1220 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    assignment

    • 669 Words
    • 2 Pages

    I confirm that I am currently meeting the pre requisites for E105 as set out in the pre registration information for students and have a valid agreement with the confirmers form. For this TMA I have only used materials drawn from the setting identified on my employers permission agreement form. In this TMA I have adhered to the E105 ethical guidance by receiving permission from my manager to discuss the setting, staff and pupils in a confidential manner. Not naming or changing the names of any individuals in such a way that maintains confidentiality.…

    • 669 Words
    • 2 Pages
    Good Essays
  • Best Essays

    IT department will have to review past security problems and methods of how it has been solved. They will also be required to arrange new problem solving methods that have not been previously implemented. IT team will need to research most current data which is stored on company’s servers and try to find and eliminate possible errors.…

    • 3482 Words
    • 14 Pages
    Best Essays
  • Good Essays

    assignment

    • 3148 Words
    • 13 Pages

    All information will be kept confidential and will be used only to develop a job description and…

    • 3148 Words
    • 13 Pages
    Good Essays
  • Good Essays

    Assignment

    • 10922 Words
    • 44 Pages

    he first leg of your journey toward self-development begins with an opportunity to take inventory of what you have and what you still need. This first unit is devoted to intrapersonal effectiveness—understanding yourself (and your goals, strengths, weaknesses, style, biases), and improving self-management skills, such as time management and stress management. As you’ll discover, “knowing yourself” may not be as easy as it sounds. However, we give you the tools to facilitate this process. Each of the four chapters in this unit helps you increase the odds of achieving intrapersonal effectiveness, and ultimately, personal and professional success and satisfaction. This first leg provides a solid start to your journey, as well as a strong foundation on which to build interpersonal, team-based, and leadership skills in the units that follow.…

    • 10922 Words
    • 44 Pages
    Good Essays
  • Powerful Essays

    “Identify what you see as the main purpose of Security Management” and “Discuss what is meant by the statement that ‘Security measures must be commensurate with the threat’”.…

    • 1598 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Given the extent of, and the nature of the organisation, the effective operation of the information technology systems is vital to the continuation of business. However, a corporation of 600 staff poses unique security challenges, many of which are satisfied with the implementation of an operational training program completed by all staff.…

    • 4348 Words
    • 18 Pages
    Powerful Essays
  • Best Essays

    Stewart, J. M., Tittel, E., & Chapple, M. (2013). Cissp, certified information systems security professional study guide. (5th ed. ed.). Indianapolis: Sybex.…

    • 2271 Words
    • 10 Pages
    Best Essays
  • Powerful Essays

    To combat against the threat the security Director/manager must have a good security and risk plan. Michael Blyth (2008) describe that a…

    • 1509 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Assignment

    • 315 Words
    • 2 Pages

    From the evidence above, we can conclude that, the primary sector has gradually declined over the past 30 years. The primary cause according to economists, is the decline in most traditional industries such as, fishing fleets and mining, furthermore, it is cheaper to import raw materials from other developing countries than it is to actually produce them in the UK.…

    • 315 Words
    • 2 Pages
    Satisfactory Essays