100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Summary Unit 7 Assignment 2

Rating
3.7
(3)
Sold
8
Pages
8
Uploaded on
14-06-2018
Written in
2017/2018

Throughout this report is the work of which achieved me the highest possible grade. All of my work was to distinction standard throughout the 2 year course. BTEC LEVEL 3 UNIT 7 P1,P2,P3,P4,P5,P6,M1,M2,M3,D1,D2

Institution
Course










Whoops! We can’t load your doc right now. Try again or contact support.

Connected book

Written for

Study Level
Examinator
Subject
Unit

Document information

Summarized whole book?
Unknown
Uploaded on
June 14, 2018
Number of pages
8
Written in
2017/2018
Type
Summary

Subjects

Content preview

Unit 7
Assignment 2
Pass Work (P4)
Security problems and guidelines
Disaster recovery policies
Disaster recovery policies state what actions are to be taken in an event whereby the
organisation has been impacted by a disaster [for more information on likely disasters its
effect of organisations refer to Unit 7 Assignment 1].
The disaster recovery policy will likely include the procedures for data relocation, use of
alternative sites, the hiring of additional of staff and equipment.
Typically organisations will be supported by appropriate levels of insurance to fund the
organisations recovery from the disaster.
If disaster recovery policies are not in place and a disaster occurs the organisation will have
a prolonged downtime and their reputation may be impacted [from losing the customer’s
information and data].
Updating of security procedures
Updates and reviews of security procedures should be carried out periodically, it is essential
to check the security policies for currency and to compare the policy against current
knowledge and new threats.
Both security and computer systems require frequent updating as advancements in security
[and threats] are being produced at a rapid pace, the updates which may need to be
implemented by the organisations systems security may have an impact on the
organisations current established system.
Typically the updates will need to be tested by the staff [who are responsible for the up
keeping of the organisation systems security] prior to being released across the entire
organisation.
Scheduling of security audits
Security audits of physical and networked systems will need to be carried out regularly
ensuring the current system is working as expected [and has no issues], typically the security
audits are carried out without the employees knowing when they’re going to be done -
proving the effectiveness of the systems in place.
Within network management, an audit of database and network logs provide a detailed look
upon the recurring issues – this can be used to highlight the organisations existing threats.
The audit is often combined with penetration testing, simulating a hacker or denial of
service attack to establish the soundness of the existing systems.
Some organisations will go as far as to employ staff with the prime objective of breaking
into the building to ensure their physical security put in place is adequate.
Codes of conduct

1|Page
Matthew Lloyd-Jones

,Unit 7
Assignment 2
Code of conducts are created to ensure the personnel who require access to a system are
legally binded to not take advantage of their access.
Employees are expected to sign, agree and adhere to the code of conduct which states on it
a variety of policies – the policies ensure the systems users will abide by rules which suit the
organisation and its security needs.
Organisations typically will include the following policies [in some form] within their code of
conduct:

 Email usage policy - This governs what subjects are deemed acceptable in the
sending of emails, the policy usually defines the acceptable size of attachments to be
sent and gives details as to the unacceptable activities such as sending data and
information to the organisations competitor.
 Internet usage policy - employees will usually have restricted access online –
ensuring employees are doing their work rather than playing games online or
accessing their social media accounts. The policy will also state what cannot be
downloaded online.
 Software acquisition and Installation policy – these policies are put in place to
prevent personal and unlicensed software from being installed into the system, upon
this it ensures there is no duplication of software. By having these policies in place
compatibility issues and potential malware from accessing the system are prevented.
Surveillance policies
Placing surveillance cameras [or an alternative piece of surveillance equipment] around the
work place within an organisation may cause unrest to the employees. Surveillance and
monitoring policies must clearly be defined to the employees and they must then agree to
the policy. The policy would include information such as, the reasons for the surveillance,
where it will be placed and what type of surveillance equipment is going to be used.
Risk management
Predicting possible issues and measuring the potential damage which can be caused to the
organisation [as a result of these issues] is essential in creating a strategy to minimise [or
eliminate] all threats to an organisation.
In managing the risks, organisations may decide to:

 Tolerate the potential risk and waste no time in coming up with a solution
 Minimise the likelihood of the risk occurring – for example purchasing an add-on
anti-virus software.
 Terminate the risk – stopping the virus.
 Transfer the risk by adapting the approach of the organisation.
Budget setting
Budget setting and the management of finances is essential in ensuring the organisation
does not overspend. It is of great importance to maintain an acceptable level of security

2|Page
Matthew Lloyd-Jones

, Unit 7
Assignment 2
within an organisation and in budgeting for organisational systems security you will need to
consider the following: The replacement of redundant equipment and software versions,
the cost of each audit, the training of staff, software licencing, the procurement of external
consultation and support, the staff wages relating to organisational systems security.




3|Page
Matthew Lloyd-Jones
$5.50
Get access to the full document:
Purchased by 8 students

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Reviews from verified buyers

Showing all 3 reviews
3 year ago

5 year ago

5 year ago

May I just ask why you have rated this document 2 star?

6 year ago

3.7

3 reviews

5
1
4
1
3
0
2
1
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MatthewIT AQA
Follow You need to be logged in order to follow users or courses
Sold
79
Member since
8 year
Number of followers
61
Documents
19
Last sold
1 year ago

I studied IT (Business) for an Extended Diploma in a 2 year BTEC course; I finished the course achieving the best possible grade while my attendance was only 70%. I aimed and received nothing less than a distinction throughout my work, this is a great opportunity to use my work to your advantage. If you did not receive the information you were looking for upon purchasing my work feel free to message me and I will FOR FREE give you additional information. All the best, Matthew

Read more Read less
3.8

10 reviews

5
3
4
3
3
3
2
1
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions