Preview

Unit 242 It Security for Users

Good Essays
Open Document
Open Document
793 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 242 It Security for Users
[242] IT security for users

[242.1] Select and use appropriate methods to minimise security risk to IT systems and data
Assessment Criteria | 1.1 | | Describe the security issues that may threaten system performanceThe possible threats to system performance may be: unwanted e-mail (‘spam’), malicious programs (including viruses, trojans) and hackers. Security precautions can be taken beforehand such as use of access controls. We can configure anti-virus software, adjust firewall settings, adjust internet security settings; backup; store personal data and software safely; treat messages, files, software and attachments from unknown sources with caution; download security software updates. | | | | | | 1.3 | | Describe the threats to system and information security and integrityThe possible threats to information security may be: from theft, unauthorised access, accidental file deletion, use of removable storage media; malicious programs (including viruses, trojans), hackers, phishing and identity theft; unsecured and public networks, default passwords and settings, wireless networks, Bluetooth, portable and USB devices. | | 1.4 | | Keep information secure and manage personal access to information sources securelyProtect systems and data: Access controls: Physical controls: log-in details should be treated as credit card information and not to be left lying anywhere with an easy access, locks, passwords, access levels. | | 1.5 | | Describe ways to protect hardware, software and data and minimise security riskThere are steps to prevent threats to system and information: access to information sources should be allowed with Username and password/PIN selection. The system set up on password strength; how and when to change passwords (monthly); online identity/profile; Real name, pseudonym; what personal information to include, who can see the information; Respect confidentiality, avoid inappropriate disclosure of

You May Also Find These Documents Helpful

  • Good Essays

    Sr-Rm-022 Part 2

    • 839 Words
    • 3 Pages

    Security should be a high level of concern in any project. “Security is primarily the responsibility of the operations group, which consist of the staff responsible for installing and operating security controls such as firewalls, intrusion detection systems, and routine backup and recovery operations” (Denis, Wixom, & Roth, 2009). However, system developers also have a responsibility when it comes to security, especially within the information systems.…

    • 839 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Hollis IS3230 Unit 3 Lab3

    • 766 Words
    • 4 Pages

    2. Describe one way to help prevent unauthorized users from logging onto another person’s user account and accessing his/her data.…

    • 766 Words
    • 4 Pages
    Good Essays
  • Good Essays

    The following table presents the possible threats, the potential vulnerabilities each threat may exploit, and area of the system effected by the threats:…

    • 745 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    It205 Capstone Question

    • 633 Words
    • 3 Pages

    In modern business, information and enterprise systems are becoming major backbones, relied upon for function, communication and longevity. Even smaller businesses have become dependent on computers for operations as well as management of information, from everything from billing, stock levels, to payroll. With the growing demand and need for computer systems and networks, issues begin to arise with systems security. Viruses, Trojan horses, worms, hackers, as well as internal security issues can plague a business. This paper will cover some of the basic concepts for system security, and possible threats.…

    • 633 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    There are many precautions that can be taken to protect IT systems and data. These are as simple as:…

    • 914 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Is 305 Week 3 Quiz

    • 577 Words
    • 3 Pages

    Using the workstation domain, define risks associated within that domain and explain what can be done to reduce risks in that domain.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    This course covers the managerial and technical considerations related to access controls, authentication, external attacks, and other risk areas facing the enterprise. This course will also survey the techniques to prevent unauthorized computer and facility access as well the concepts for protecting the hardware and software assets of the enterprise.…

    • 2331 Words
    • 10 Pages
    Satisfactory Essays
  • Satisfactory Essays

    As The Organization

    • 338 Words
    • 2 Pages

    Proper management of user accounts will ensure the information and access to devices on the network confidential.…

    • 338 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    1. Viruses. "A Virus is a program that is activated by attaching copies of itself to executable objects. Viruses can reach your computer from other infected computers, via data medium (CD, DVD, etc.) or through a network (local or Internet)." (Symantec, 2013). Due to the shear frequency of virus attacks, we shall list them number one. According to a Department of Trade and Industry (DTI) survey, 72% of all companies received infected e-mails or files last year and for larger companies this rose to 83% (Vernon, 2004). The potential impact of the network becoming infected with a virus could be devastating. File destruction, file corruption, disabling user programs, loss of critical data and overloading the network are just a few of the potential impacts of a virus. Viruses can be introduced in to the network in many ways. Employees downloading /using unauthorized programs, opening and executing infected email attachments, bringing infected files from home on a thumb drive or CD, accessing the network with their smart phone,…

    • 1430 Words
    • 4 Pages
    Better Essays
  • Good Essays

    How to reduce the attack surface with what hardening steps and network security management best practices, (100) 2) ensure secure authentication, authorization, and accounting, (100) and 3) prevent or respond to intrusions. (100)…

    • 310 Words
    • 2 Pages
    Good Essays
  • Better Essays

    By identifying the vulnerabilities and potential attacks we can mitigate the risks to minimal. The recommendations stated above will improve our security and by continuous monitoring and updating we will keep the attacks to acceptable level. Our defined acceptable level should be no leakage from our company’s sensitive data.…

    • 1074 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Active Review #4

    • 552 Words
    • 3 Pages

    The first way that will be explained is information security management. The goal is information systems security can be achieved in many ways. Information Systems security involved a trade-off between costs and risks (Kroenke, 2012). Threats can be stopped, or if not stopped, the costs of loss can be reduced by creating appropriate safeguards (Kroenke, 2012). Also, another goal is finding an appropriate trade-off between the risk of loss and the cost of implementing safeguards (Kroenke, 2012). Overall, get in front of the security problem by making the appropriate trade-off for your life and your business (Kroenke, 2012). The impact of computer security problem varies in many ways. There is no full extent of data and financial loss due to computer security threats. Certainly, the losses due to human error are enormous, but few organizations compute these losses and even fewer publish them (Kroenke, 2012).…

    • 552 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    E-Commerce and Cybercrime

    • 1507 Words
    • 7 Pages

    Students’ answers will vary. However, with the increased business use of the Internet, intranets and extranets there is no doubt that the number of potential security problems will also increase. Issues such as hacking, data alteration unauthorized data access, denial of service and so on will become prime security problems. As companies forge ahead in e-commerce and e-business activities, the stakes get progressively higher, and the potential threat to the vulnerability of their data is also increasing.…

    • 1507 Words
    • 7 Pages
    Powerful Essays
  • Better Essays

    Ethical Hacking

    • 2948 Words
    • 12 Pages

    Computer security is required because most organizations can be damaged by hostile software or intruders. There may be danger several forms of damage which are obviously interrelated which are produced by the intruders. These include:…

    • 2948 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    System security for user

    • 499 Words
    • 2 Pages

    1. Always use a strong password with a combination of alphabets, numbers and special characters…

    • 499 Words
    • 2 Pages
    Satisfactory Essays