Outcome 1: Use appropriate methods to minimise security risks to IT systems and data
1 Identify security issues that may threaten system performance
There are many threats that can affect system performance. These can come from many sources e.g. software downloads, floppy disks, CD’s, DVD’s, attachments and the internet. The threats are installed over the internet and are called spyware and adware. It is also possible for the threats to be transmitted through emails, key loggers which get through firewalls. The most malicious software, this comes in lots of forms which is designed to damage and disrupt. It’s important in the surgery to follow the Information Security Policy, we use many different sources daily, by following the policy we are all reducing the threat to system performance
2 Take appropriate security precautions to protect IT systems and data
There are many precautions that can be taken to protect IT systems and data. These are as simple as:
Never swapping passwords with others
Failure to keep passwords secure
Using ineffective passwords e.g. password1
Download or attempt to download software
Ensure all anti-virus software is up to date
Run regular virus checks
3 Identify threats to information security associated with the widespread use of technology
The threats associated with the use of widespread technology are:
Spam – for example when using a programme like Microsoft Outlook you have an address book with all saved email addresses, viruses etc. can gain access to these and use them to send spam emails to other via emails, the recipient is then at threat.
Passwords – for example sharing passwords, insecure passwords, storing username and passwords in public web browsers. This makes your security level low giving easy access to hacker and viruses.
Computers – for example when using a public computer it’s important to log out while the computer is unattended it’s very simple