100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Essay

Unit 7 Organisational Systems Security (Part 1 of 2)

Rating
4.5
(4)
Sold
3
Pages
10
Uploaded on
03-05-2017
Written in
2016/2017

Unit 7 Organisational Systems Security (P1, P2, P3, M1, M2) Explain the impact of different types of threat on an organisation (P1) Describe how physical security measures can help keep systems secure (P2) Describe how software and network security can keep systems and data secure (P3) Discuss information security (M1) Explain the operation and use of an encryption technique in ensuring security of transmitted information (M2)

Show more Read less








Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
May 3, 2017
Number of pages
10
Written in
2016/2017
Type
Essay
Professor(s)
Unknown
Grade
Unknown

Subjects

Content preview

Unit 7: Assignment 1 – PIX Security Systems
Scenario
I work as a junior technician for PIX Security Systems which provides network security con-
sultancy services to small and medium sized organisations. My senior security consultant
has asked me to prepare a user guide to provide help and guidance on security issues.


Explain the impact of different types of threat on an organisation (P1)
Internal Threats
Scanners – There are loads of different ways used by people to attack systems using
scanners. People can download scanners from the internet so they can scan addresses and
obtain information about transmission control protocol ports. People can find IP addresses
by mapping using domain name system. Hackers use this tactic making sure what systems
are active and ready to hack.
Range of Addresses - This is a scanner which is fairly easy to use, its fast and visual at
scanning when it searches for multiple addresses in the angry IP scanner.
Man in The Middle – This is attack is when a malicious person puts himself/herself into a
talk amongst two individuals. Then this person pretends to be both individuals and gets the
access to the information they were attempting to transfer amongst themselves. Man in the
middle attack lets a user steal, send and get data that was meant to be sent to someone
else or not meant to be sent at all. Without either of the two individuals knowing until it is
too late to do anything about it. Man in the middle is a type of eavesdropping attack also
exposes the people private chat or other data and also the real time processing of
transactions.
Magic Disk Tactics - They are known to be boot disks for the use of restarting the computer
and undermine the operating system. There are some very good magic disks for example
the ultimate boot CD that can solve issues of viruses and Trojans, drive, hardware and
operating system failures. But to avoid anyone using a magic disk you have to make sure a
password is on the lock of the basic input/output system and also USB sticks, floppy disks
and CD/DVDs should not be used as boot devices.
Key logging - Key loggers are applications that are used to record key stroke, also can be
used for mouse activities then IT sends the information to a file or in some case that is
normally used in a remote network location. They are very hard to track because they are
hidden, but they can be found using anti-virus software application.
Denial of Service – Denial of service there are loads of them, the one that is used the most is
the denial of service attack which simply transmits loads of traffic to a certain network
address, much more than the programmers who organised the data buffers expected
someone would transmit and then this overflows the traffic and it just simply crashes. The
attacker might know that system they are attacking has a shortcoming that can be
uncovered or the aggressor may essentially attempt the assault on the off chance that he
gets fortunate and it works.

Reviews from verified buyers

Showing all 4 reviews
6 year ago

8 year ago

8 year ago

8 year ago

4.5

4 reviews

5
3
4
0
3
1
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
1999b Harrow College (London)
View profile
Follow You need to be logged in order to follow users or courses
Sold
66
Member since
8 year
Number of followers
55
Documents
50
Last sold
4 year ago
Networking, Systems Support and Programming Assignments.

4.4

19 reviews

5
12
4
5
3
1
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions