Preview

Unit 242 It Security for Users

Good Essays
Open Document
Open Document
793 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 242 It Security for Users
[242] IT security for users

[242.1] Select and use appropriate methods to minimise security risk to IT systems and data
Assessment Criteria | 1.1 | | Describe the security issues that may threaten system performanceThe possible threats to system performance may be: unwanted e-mail (‘spam’), malicious programs (including viruses, trojans) and hackers. Security precautions can be taken beforehand such as use of access controls. We can configure anti-virus software, adjust firewall settings, adjust internet security settings; backup; store personal data and software safely; treat messages, files, software and attachments from unknown sources with caution; download security software updates. | | | | | | 1.3 | | Describe the threats to system and information security and integrityThe possible threats to information security may be: from theft, unauthorised access, accidental file deletion, use of removable storage media; malicious programs (including viruses, trojans), hackers, phishing and identity theft; unsecured and public networks, default passwords and settings, wireless networks, Bluetooth, portable and USB devices. | | 1.4 | | Keep information secure and manage personal access to information sources securelyProtect systems and data: Access controls: Physical controls: log-in details should be treated as credit card information and not to be left lying anywhere with an easy access, locks, passwords, access levels. | | 1.5 | | Describe ways to protect hardware, software and data and minimise security riskThere are steps to prevent threats to system and information: access to information sources should be allowed with Username and password/PIN selection. The system set up on password strength; how and when to change passwords (monthly); online identity/profile; Real name, pseudonym; what personal information to include, who can see the information; Respect confidentiality, avoid inappropriate disclosure of

You May Also Find These Documents Helpful

  • Good Essays

    Sr-Rm-022 Part 2

    • 839 Words
    • 3 Pages

    Security Controls Security should be a high level of concern in any project. “Security is primarily the responsibility of the operations group, which consist of the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations” (Denis, Wixom, & Roth, 2009). However, system developers also have a responsibility when it comes to security, especially within the information systems.…

    • 839 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    As The Organization

    • 338 Words
    • 2 Pages

    Proper management of user accounts will ensure the information and access to devices on the network confidential.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Area of Systems Threat Potential Vulnerability Networks Unauthorized access Unsecured equipment room Confidentiality breach E-mail that doesn't employ scanning of messages…

    • 745 Words
    • 3 Pages
    Good Essays
  • Good Essays

    How to reduce the attack surface with what hardening steps and network security management best practices, (100) 2) ensure secure authentication, authorization, and accounting, (100) and 3) prevent or respond to intrusions. (100)…

    • 310 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    u04a1 Preliminary Security Assessment TS5311 Enterprise Security February 3, 2013 Introduction The number one responsibility of the Information Assurance/Network Security Officer(s) is to maintain the best security posture for the network that is possible. This task also means that the confidentiality, availability and integrity of the system are maintained. One of the first steps towards this is to perform an assessment of the potential issues with all areas of the network. A preliminary security assessment will begin the task of identifying a list of vulnerabilities (weaknesses and flaws) that could possibly be exploited by a threat (Develop, n.d.).…

    • 1453 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Security Plan

    • 3805 Words
    • 16 Pages

    Security Threat Security Threat Description Humans Behaviour If someone accidentally unplugs or turns off the wrong device, a hacker/cracker executes an exploit and unexpectedly crashes a server, an employee steals a device. The most common threat is users in an organisation especially contractors including cleaning staff.…

    • 3805 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    Course Description This course covers the managerial and technical considerations related to access controls, authentication, external attacks, and other risk areas facing the enterprise. This course will also survey the techniques to prevent unauthorized computer and facility access as well the concepts for protecting the hardware and software assets of the enterprise.…

    • 2331 Words
    • 10 Pages
    Satisfactory Essays
  • Powerful Essays

    Policy Solutions ……………………………...……………...10 Budget ………………………………………………………….12 Summary ………………………………………………………13 References……………………………………………………...14 Company Overview Aircraft Solutions (AS) company Advanced Security: Take advantage of the latest in content security, encryption, identity authentication, authorization, and intrusion prevention.…

    • 3659 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    By identifying the vulnerabilities and potential attacks we can mitigate the risks to minimal. The recommendations stated above will improve our security and by continuous monitoring and updating we will keep the attacks to acceptable level. Our defined acceptable level should be no leakage from our company’s sensitive data.…

    • 1074 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    Capstone Assignment: Systems Security Name IT/205 December 16, 2012 Professor Systems Security In modern business, information and enterprise systems are becoming major backbones, relied upon for function, communication and longevity. Even smaller businesses have become dependent on computers for operations as well as management of information, from everything from billing, stock levels, to payroll. With the growing demand and need for computer systems and networks, issues begin to arise with systems security. Viruses, Trojan horses, worms, hackers, as well as internal security issues can plague a business. This paper will cover some of the basic concepts for system security, and possible threats.…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Information Use

    • 726 Words
    • 3 Pages

    The basic elements to protect information today is firewalls, and security software programs that help prevent intruders from attaching companies private information. Firewalls help protect connections on local devices where information may be retrieved. Control Alt and delete also help lock our workstations from people possibly gaining access to personal or business information.…

    • 726 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Unit 119: IT Security For Users Outcome 1: Use appropriate methods to minimise security risks to IT systems and data…

    • 914 Words
    • 3 Pages
    Good Essays
  • Better Essays

    1. Viruses. "A Virus is a program that is activated by attaching copies of itself to executable objects. Viruses can reach your computer from other infected computers, via data medium (CD, DVD, etc.) or through a network (local or Internet)." (Symantec, 2013). Due to the shear frequency of virus attacks, we shall list them number one. According to a Department of Trade and Industry (DTI) survey, 72% of all companies received infected e-mails or files last year and for larger companies this rose to 83% (Vernon, 2004). The potential impact of the network becoming infected with a virus could be devastating. File destruction, file corruption, disabling user programs, loss of critical data and overloading the network are just a few of the potential impacts of a virus. Viruses can be introduced in to the network in many ways. Employees downloading /using unauthorized programs, opening and executing infected email attachments, bringing infected files from home on a thumb drive or CD, accessing the network with their smart phone,…

    • 1430 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Weak system security can cause massive problems for an organisation. Holes in security can allow hackers to gain access to an organisations data or its customers’ personal information etc. Once this happens, drastic problems can be caused for the organisation; anything from severe loss of earnings, loss of customers or even bankruptcy if the problem is not taken under control quickly. I will talk about some of the products of having weak system security, and the problems that these can cause.…

    • 744 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    * Encyclopedia * Slideshows * Get the Magazine Home > Technology > Managing Technology > 5 Ways to Avoid a Costly Data Security Breach…

    • 823 Words
    • 3 Pages
    Good Essays