Preview

Unit 119 IT Security for users

Good Essays
Open Document
Open Document
914 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 119 IT Security for users
Unit 119: IT Security For Users

Outcome 1: Use appropriate methods to minimise security risks to IT systems and data
1 Identify security issues that may threaten system performance
There are many threats that can affect system performance. These can come from many sources e.g. software downloads, floppy disks, CD’s, DVD’s, attachments and the internet. The threats are installed over the internet and are called spyware and adware. It is also possible for the threats to be transmitted through emails, key loggers which get through firewalls. The most malicious software, this comes in lots of forms which is designed to damage and disrupt. It’s important in the surgery to follow the Information Security Policy, we use many different sources daily, by following the policy we are all reducing the threat to system performance

2 Take appropriate security precautions to protect IT systems and data
There are many precautions that can be taken to protect IT systems and data. These are as simple as:
 Never swapping passwords with others
 Failure to keep passwords secure
 Using ineffective passwords e.g. password1
 Download or attempt to download software
 Ensure all anti-virus software is up to date
 Run regular virus checks

3 Identify threats to information security associated with the widespread use of technology
The threats associated with the use of widespread technology are:
 Spam – for example when using a programme like Microsoft Outlook you have an address book with all saved email addresses, viruses etc. can gain access to these and use them to send spam emails to other via emails, the recipient is then at threat.
 Passwords – for example sharing passwords, insecure passwords, storing username and passwords in public web browsers. This makes your security level low giving easy access to hacker and viruses.
 Computers – for example when using a public computer it’s important to log out while the computer is unattended it’s very simple

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Unauthorized access to data centers, computer rooms and wiring closets, servers must be shut down occasionally for maintenance causing network downtime, data can be easily lost or corrupt and recovering critical business functions may take too long to be useful.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    IS3110 U5D1

    • 712 Words
    • 3 Pages

    Remove unnecessary services, applications, and network protocols to reduce exploits on applications you commonly are not using.…

    • 712 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Access to credentials through data theft, access to authenticated user session, attacker can do network eavesdropping, brute force attacks, dictionary attacks, cookie replay attacks…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It is a common sense that systems and networks should be protected from the damage caused by Trojans, viruses, and Worms. Practices that can help to prevent infection include these:…

    • 546 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Sending critical information such as credit card numbers or bank account numbers puts it at risk of being intercepted by hackers or cyber attacks.…

    • 691 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Ais Project

    • 1021 Words
    • 5 Pages

    (2)Because if your password is known by others, these people might log on the system to see what you do.…

    • 1021 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Almost everyone now days has some computer device on them almost all the time, people are always checking social media through smartphones or performing some online activity. The online infrastructure has endpoints; these endpoints transmit data. Businesses use many technologies to assist them in providing certain personal information that needs to be protected. For example, law enforcement uses computer devices to search for information on a suspect. There are other technologies such as monitoring devices from hospitals that allow real-time feedback of the patient's vitals. Many individuals use laptops or smartphones to access his or her online banking account to transfer, withdraw, or deposit money. All of the information that is gathered and stored online becomes vulnerable, and if…

    • 780 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Ethical Principles

    • 1391 Words
    • 6 Pages

    "Harm" means injury or negative consequences, such as undesirable loss of information, loss of property, property damage, or unwanted environmental impacts. This principle prohibits use of computing technology in ways that result in harm to any of the following: users, the general public, employees, and employers. Harmful actions include intentional destruction or modification of files and programs leading to serious loss of resources or unnecessary expenditure of human resources such as the time and effort required to purge systems of "computer viruses."…

    • 1391 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    Danchev, d. (2003). Building and implementing a successful information security policy (P-7). Retrieved from: http://www.windowsecurity.com/pages/security-policy.pdf…

    • 1134 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Opens up the possibility for hackers to commit fraud and launch spam and virus attacks.…

    • 1647 Words
    • 7 Pages
    Good Essays
  • Good Essays

    resources like memory or disk space. A virus can be annoying or it can cost you…

    • 1319 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Antivirus Programs

    • 299 Words
    • 2 Pages

    An antivirus program protects a computer against viruses by identifying and removing any computer virus found in memory, on storage media, or on incoming files. When you purchase a new computer, it often includes antivirus software. Antivirus programs work by scanning for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. In addition, many antivirus programs automatically scan files downloaded from the Web, e-mail attachments, opened files, and all types of removable media inserted in the computer (Karanos 201-205).…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    3) Privacy loss: Insecurity of databases and private information can cause leaking to the unauthorized user.…

    • 623 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    advantage of computer

    • 264 Words
    • 2 Pages

    5. Details such as bank records, can be hacked into, and thus your personal information is no longer as safe as it used to be.…

    • 264 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Disadvantage of Internet

    • 470 Words
    • 2 Pages

    · Since business dealings and financial transactions have become easier because of the internet another problem that has arisen is that people can now misuse your private information including financial details such as the credit card number. There have been cases of financial frauds and other problems that people have experienced following misuse of such sensitive information. Some unscrupulous individuals have been successful in creating viruses and links that once clicked can automatically…

    • 470 Words
    • 2 Pages
    Good Essays