100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Essay

UNIT 7 System Security and Encryption (Distinction Grade)

Rating
3.0
(2)
Sold
6
Pages
12
Grade
A
Uploaded on
24-06-2023
Written in
2022/2023

UNIT 7.2 *Distinction level grade* guaranteed 4,100 words.

Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Study Level
Examinator
Subject
Unit

Document information

Uploaded on
June 24, 2023
Number of pages
12
Written in
2022/2023
Type
Essay
Professor(s)
Unknown
Grade
A

Subjects

Content preview

Unit 7 It System Security and Encryption
P5 Explain how protection techniques can help defend an
organisation from security threats.


Security threats can be defended by various techniques which organisations can utilise to protect
the IT systems around the company. They should be cautious about the threats and already set up
some techniques to protect the systems. The IT security of an organisation can be very crucial. This is
because data of an organisation is confidential, and it may be dangerous for the company if the data
has been breached and is spread out. The IT security systems can be costly for organisations as it is
difficult to secure data and keep them all protected. Security breaches can affect the organisation is
a devastating way. It can cause damage to the company's reputation, the data that the organisation
has gathered can be stolen and do something malicious with it, they can have a financial lost and
may get fines as they can fail to follow some of the data protection legislations. The organisations
can use these techniques to protect the IT systems:

- Physical Security
o Building design
o Computer network room security
o Backup for data
o IT disaster recovery plans
- Policies and procedures
o Organisations policies
o Procedures
o Security audits
o Security baselines
- Software-based protection
o Anti-virus software
o Firewalls
o Intrusion detection systems (IDSs)
o Domain management
o User authentication
o Access controls



Physical security
The physical security of the IT systems includes building security, backups for data and disaster
recovery plans for the IT systems. This security technique must be included in the organisation.

Building design and computer network room security
The computer systems need to be protected physically in the case that someone's interaction can
damage the systems. The equipment's such as the monitor, hard drives, the wires the connects to
the computer systems, it can be easily destroyed if not protected which can put the systems in risks.
They should put the equipment’s in a secure location in where nothing can harm it. In this way it

, puts less risk for the organisation. Some equipment’s needs to be kept safe away so no one can
touch. Once those important equipment’s have been played with or moved around unintentionally
then it can cost major damage to the organisations computer systems. The organisation must keep
the building secure such as purchasing and installing locks, biometrics and others to keep the
computer systems safe and secure from external or internal damages. The organisation must keep in
mind how the building will be structured to prepare for disasters for example, an earthquake.

Backup for data
For physical security, backing up data is important and very necessary for the organisation. The
organisations building design and computer network room security may not work or secure the
computer systems all the time. This still leaves the data vulnerable, and the organisation may lose it.
However, a way to keep the data safe is to save the data in a safe place or save the data in multiple
places. This makes the data to be safer and more secured. This is because if the building desing or
the computer room security has been breached or destroyed, the data may have been lost but if the
organisation has backed up their data, then the data can be found somewhere else, and the
companies progress would not have to start at zero.

The organisation must think how often they are supposed to back up the data. A good way to think
of how often the organisation must back up the data is by using a recovery point objective. This is
when the amount of time that the company can afford to lose the data in the computer systems is
defined and clarified. Another way is by simply backing up the data in the span of 24 hours. They
should also think whether they want to back up the data in other storages or backup the data online
or use both ways. The organisations must think of where they can back up the data as well.

The selection of data that they would back up must be thought off. The organisations must back up
data that are important and crucial, but they may think of whether they would back up data that is
not very important, but they may back it up as well. There are also different types of back up which
is incremental backup and differential backup. Incremental backup is when the required data is
backed up first and then back up data that has only been changed for the rest of the week. The
backup would be quicker as the data that has to be backed up would be less. A disadvantage of using
incremental backup is that you must restore all the data that has been made for the whole week
even if there was a backup failure in one day. The other type of data, differential backup, is when a
full backup is made from the beginning and then back up data when there has been changes made.
This is basically saying to do a full back up on the weekends and then for the rest of the week, back
up data every day. A disadvantage of this is it would need more time and more storage space as it
would need to back up any changes made since the beginning of the week’s full backup.

IT disaster recovery plans
Organisations would need to use IT systems to for running their businesses. They would need to
think of what to do and create a plan in the case that a disaster strikes in the organisation. The data
backup may not be of us if the IT systems is gone. The organisation must create a plan even before
the disaster happens and there are various of way for a disaster recovery.

Hot site is where the organisation preserves a duplicate of all the server systems at a different site to
the main computer operations. The computers, networking devices and internet connections would
be needed for the systems to run. This site is frequently placed in a company location where there
are non-critical computing operations are performed and it has that capacity to take over the main
site at a short notice in big businesses with a very short RTO. However, this site is expensive as the
$4.79
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
ComputingWithX
3.0
(2)

Reviews from verified buyers

Showing all 2 reviews
10 months ago

10 months ago

3.0

2 reviews

5
0
4
0
3
2
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
ComputingWithX Abacus College, Oxford
Follow You need to be logged in order to follow users or courses
Sold
7
Member since
2 year
Number of followers
2
Documents
4
Last sold
5 months ago
ComputingWithX

All about computing and that \\\'nerdy\\\' stuff.

3.0

2 reviews

5
0
4
0
3
2
2
0
1
0

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions