100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Summary Learning Aim A/B | Unit 7 - IT Systems Security and Encryption | BTEC Computing | 2020 $10.40   Add to cart

Summary

Summary Learning Aim A/B | Unit 7 - IT Systems Security and Encryption | BTEC Computing | 2020

 30 views  0 purchase
  • Course
  • Institution

AB.D1 Evaluate the effectiveness of the techniques used to protect organisations from security threats while taking account of the principles of information security and legal requirements.

Preview 2 out of 5  pages

  • August 12, 2023
  • 5
  • 2020/2021
  • Summary
avatar-seller
Pearson BTEC Level 3 Extended Certificate in Computing

Unit 7: IT Systems Security and Encryption

Learning Aim A/B:

AB.D1 Evaluate the effectiveness of the techniques used
to protect organisations from security threats
while taking account of the principles of
information security and legal requirements.

, D1 Effectiveness of techniques to protect
against security threats
Introduction

In this document I will be evaluating the effectiveness of the techniques used to protect our
organisation from security threats. The principles of information security and the legal requirements
are also important and will be considered in this document.

Security threats

There are a number of threats the company could face and we will need to use effective methods to
stop/mitigate the effects of them. Internal threats, such as employees gaining access to highly
confidential information, need to be prevented as if the banking details got into the wrong hands
they could be used for fraudulent activities. There are two main techniques which could be used to
protect against this type of attack, these are: having passwords and codes on certain files (File/folder
access controls) to protect files on the company network and having an access control system for
staff so that only certain employees can enter rooms which contain highly confidential information
customers private and banking details. Both these methods are classed as physical security and can
protect against security threats as they restrict the number of people who have access to this data,
meaning if someone just walked into the company building they wouldn’t have access to anything,
whilst only authorised staff members would have access to the data. To further improve the physical
security, we could install CCTV cameras around our building and offices, so that we could monitor
our site 24 hours a day, whilst having automatic locking doors (part of the access control) on the
server room would prevent any damage or theft of the data inside that room.

Physical Security: 8/10 | Overall, these methods of
physical security will be effective in protecting against
security threats as they will mitigate the chances of
someone, who shouldn’t have access to information,
looking or gaining data. They also meet the
requirements of the principles of confidentiality and
availability but could be prone to social engineering;
for example, an employee getting manipulated into
giving his password or information about clients away.

An additional threat includes external threats - those which come from outside the company. This
type of threat poses a bigger danger to our security as it would be harder to track down the
perpetrator and, because the software often used is hidden, it is harder to know when an attack has
occurred. To counter this threat, we will need to implement both hardware and software security -
these take the shape of anti-virus software and firewalls. On our systems we will need to use anti-
virus software as this will allow us to detect and destroy any computer virus. This is important as
viruses would destroy or steal data, and corrupt the computer system, so it is integral to use such
software to protect the confidential information we hold. To insure the highest protection against
viruses we will need to invest in the latest anti-virus software, as these are regularly updated to
detect and destroy new and improved viruses that may appear. Firewalls are also very important as
they would protect our systems and all the devices (computers and laptops) from any unauthorized


Unit 7: IT Systems Security and Encryption

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller BTECcomputingANDbusiness. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.40. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75632 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.40
  • (0)
  Add to cart