Preview

Unit 119 IT Security for users

Good Essays
Open Document
Open Document
914 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 119 IT Security for users
Unit 119: IT Security For Users

Outcome 1: Use appropriate methods to minimise security risks to IT systems and data
1 Identify security issues that may threaten system performance
There are many threats that can affect system performance. These can come from many sources e.g. software downloads, floppy disks, CD’s, DVD’s, attachments and the internet. The threats are installed over the internet and are called spyware and adware. It is also possible for the threats to be transmitted through emails, key loggers which get through firewalls. The most malicious software, this comes in lots of forms which is designed to damage and disrupt. It’s important in the surgery to follow the Information Security Policy, we use many different sources daily, by following the policy we are all reducing the threat to system performance

2 Take appropriate security precautions to protect IT systems and data
There are many precautions that can be taken to protect IT systems and data. These are as simple as:
 Never swapping passwords with others
 Failure to keep passwords secure
 Using ineffective passwords e.g. password1
 Download or attempt to download software
 Ensure all anti-virus software is up to date
 Run regular virus checks

3 Identify threats to information security associated with the widespread use of technology
The threats associated with the use of widespread technology are:
 Spam – for example when using a programme like Microsoft Outlook you have an address book with all saved email addresses, viruses etc. can gain access to these and use them to send spam emails to other via emails, the recipient is then at threat.
 Passwords – for example sharing passwords, insecure passwords, storing username and passwords in public web browsers. This makes your security level low giving easy access to hacker and viruses.
 Computers – for example when using a public computer it’s important to log out while the computer is unattended it’s very simple

You May Also Find These Documents Helpful

  • Better Essays

    Almost everyone now days has some computer device on them almost all the time, people are always checking social media through smartphones or performing some online activity. The online infrastructure has endpoints; these endpoints transmit data. Businesses use many technologies to assist them in providing certain personal information that needs to be protected. For example, law enforcement uses computer devices to search for information on a suspect. There are other technologies such as monitoring devices from hospitals that allow real-time feedback of the patient's vitals. Many individuals use laptops or smartphones to access his or her online banking account to transfer, withdraw, or deposit money. All of the information that is gathered and stored online becomes vulnerable, and if…

    • 780 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Ais Project

    • 1021 Words
    • 5 Pages

    (2)Because if your password is known by others, these people might log on the system to see what you do.…

    • 1021 Words
    • 5 Pages
    Satisfactory Essays
  • Better Essays

    Ethical Principles

    • 1391 Words
    • 6 Pages

    "Harm" means injury or negative consequences, such as undesirable loss of information, loss of property, property damage, or unwanted environmental impacts. This principle prohibits use of computing technology in ways that result in harm to any of the following: users, the general public, employees, and employers. Harmful actions include intentional destruction or modification of files and programs leading to serious loss of resources or unnecessary expenditure of human resources such as the time and effort required to purge systems of "computer viruses."…

    • 1391 Words
    • 6 Pages
    Better Essays
  • Good Essays

    1. Has IT professionals use every precaution to prevent given out any access to passwords, personnel identifications or other sensitive information to can be used in the database systems.…

    • 1251 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Opens up the possibility for hackers to commit fraud and launch spam and virus attacks.…

    • 1647 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Final project it255

    • 1631 Words
    • 5 Pages

    System security has been very important ever since the beginning of the computer age. Security is setup for a number of reason whether it be to protect data from those who are not supposed to see it or hide it from those who are supposed to security at any point is important. Security can be physical, virtual or a mixture of the two, but in this day and age it is definitely needed. In the following I will give my opinion on how to increase or the steps I would use to implement security to a certain situation.…

    • 1631 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Disadvantage of Internet

    • 470 Words
    • 2 Pages

    · Since business dealings and financial transactions have become easier because of the internet another problem that has arisen is that people can now misuse your private information including financial details such as the credit card number. There have been cases of financial frauds and other problems that people have experienced following misuse of such sensitive information. Some unscrupulous individuals have been successful in creating viruses and links that once clicked can automatically…

    • 470 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Antivirus Programs

    • 299 Words
    • 2 Pages

    An antivirus program protects a computer against viruses by identifying and removing any computer virus found in memory, on storage media, or on incoming files. When you purchase a new computer, it often includes antivirus software. Antivirus programs work by scanning for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. In addition, many antivirus programs automatically scan files downloaded from the Web, e-mail attachments, opened files, and all types of removable media inserted in the computer (Karanos 201-205).…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    advantage of computer

    • 264 Words
    • 2 Pages

    5. Details such as bank records, can be hacked into, and thus your personal information is no longer as safe as it used to be.…

    • 264 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Danchev, d. (2003). Building and implementing a successful information security policy (P-7). Retrieved from: http://www.windowsecurity.com/pages/security-policy.pdf…

    • 1134 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    3) Privacy loss: Insecurity of databases and private information can cause leaking to the unauthorized user.…

    • 623 Words
    • 3 Pages
    Good Essays
  • Good Essays

    resources like memory or disk space. A virus can be annoying or it can cost you…

    • 1319 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Computer networks have allowed activity that none dreamed possible hundreds of years ago; however, millions of attempts to compromise the security of computer systems are made on a daily basis. Knowing and using the 12 principles of information security allows security professionals to mitigate most threats to data security. By understanding the different types of security policies, effective policies can be put into place that ensure better information security. What security professionals must find paramount is that 100% secured is impossible to achieve.…

    • 841 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Internet Security Overview

    • 9590 Words
    • 39 Pages

    However, along with the convenience and easy access to information come new risks. Among them are the risks that valuable information will be lost, stolen, corrupted, or misused and that the computer systems will be corrupted. If information is recorded electronically and is available on networked computers, it is more vulnerable than if the same information is printed on paper and locked in a file cabinet. Intruders do not need to enter an office or home, and may not even be in the same country. They can steal or tamper with information without touching a piece of paper or a photocopier. They can create new electronic files, run their own programs, and hide evidence of their unauthorized activity.…

    • 9590 Words
    • 39 Pages
    Powerful Essays
  • Powerful Essays

    Using a proper network security strategy reduces and, in some cases, even avoids the listed harmful attacks from occurring on a network (Gary, T., et al, Mar. 2002). This paper will discuss such a strategy used by the Los Angeles Department of Water and Power (LADWP), as well as the strategy's three primary elements: prevention, detection, and recovery.…

    • 1675 Words
    • 7 Pages
    Powerful Essays