logo-home

Personal Folder of BTEC L3 IT Practitioners (Achived D*DD)

Former CANDI student studying Computer Forensics in Middlesex University. Achieved D*DD in BTEC L3 Extended Diploma in IT Practitioners. Work inspired by others and own research, only uploading theoretical documents.

I'd like to stress the fact that you should not completely copy the work, but use the provided work as a guide to what you need to write.

If you have any queries, feedback, or anything else. Feel free to send me a message and I'll reply as soon as possible!

Community

  • Followers
  • Following

65 Reviews received

76 items

P1 - Describe the technologies required for e-commerce

(0)
£3.10
2x  sold

Explain the technologies required for e-commerce and which might be needed by Cuckoo. Grading tip Technologies include the hardware, software and networking needed for e-commerce. Make sure you consider all elements. Discuss both the ones you choose for Cuckoo and those you discard. Technologies: hardware and software e.g. web servers, browsers, server software, web authoring tools, database system; networking e.g. TCP/IP addresses, ports and protocols; considerations e.g. domain names, multiple...

i x
  • Essay
  •  • 4 pages • 
  • by rapidhelp • 
  • uploaded  06-06-2017
Quick View
i x

P6 - Review the laws related to security and privacy of data

(1)
£3.10
3x  sold

c. Review the laws related to security and privacy of data. In your report you should consider:  legislation eg Computer Misuse Act 1990;  Copyright, Designs and Patents Act 1988;  privacy and compensation requirements of Data Protection Act 1984, 1998, 2000

i x
  • Essay
  •  • 3 pages • 
  • by rapidhelp • 
  • uploaded  05-06-2017
Quick View
i x

P3 - Describe how software and network security can keep systems and data secure

(1)
£3.10
2x  sold

2. Task 2a: Describe HOW the use of the following software and network security can keep systems and data secure. o encryption techniques eg public and private key; o diskless networks; o use of backups; o audit logs; o firewall configuration; o virus checking software; o use of virtual private networks (VPN); o intruder detection systems; o passwords; o levels of access to data; o software updating; o disaster recovery eg backup systems, whole system replacement, tiers of recovery

i x
  • Presentation
  •  • 14 pages • 
  • by rapidhelp • 
  • uploaded  05-06-2017
Quick View
i x

P2 - Describe how physical security measures can help keep systems secure

(0)
£2.99
0x  sold

1. Task 1: Describe HOW could the use of the following security measures help keep systems secure:  (locks; visitors passes; sign in/out systems; biometrics eg retinal scans, fingerprint, voice recognition; guards, cable shielding).

i x
  • Essay
  •  • 3 pages • 
  • by rapidhelp • 
  • uploaded  05-06-2017
Quick View
i x

D1 - Discuss different ways of recovering from a disaster

(3)
£2.99
12x  sold

Investigate disaster recovery options how and when they would be used and discuss different ways of recovering from a disaster.

i x
  • Essay
  •  • 2 pages • 
  • by rapidhelp • 
  • uploaded  05-06-2017
Quick View
i x

M3 - Explain the role of ethical decision making in organisational IT security

(1)
£2.99
0x  sold

d. Building on the previous task explain the role of ethical decision making in organisational IT security providing evidence that you have given real consideration to the issues involved and come to a decision about how to deal with them. Ethical decision-making:  freedom of information versus personal privacy (electoral roll, phone book and street maps put together);  permission eg to use photographs or videos, CCTV footage

i x
  • Essay
  •  • 2 pages • 
  • by rapidhelp • 
  • uploaded  05-06-2017
Quick View
i x

P5 - Explain how employment can affect security

(0)
£2.99
0x  sold

b. Explain how employment contracts can affect security considering the following • hiring policies • separation of duties • ensuring compliance including disciplinary procedures • training and communicating with staff as to their responsibilities

i x
  • Essay
  •  • 2 pages • 
  • by rapidhelp • 
  • uploaded  05-06-2017
Quick View
i x

P4 - Explain the policies and guidelines for managing organisational IT security issues

(1)
£3.10
6x  sold

a. Write a report explaining the policies and guidelines employed by an organisation to manage IT Security issues. Security policies and guidelines: o disaster recovery policies; o updating of security procedures; o scheduling of security audits; o codes of conduct eg email usage policy, internet usage policy, software acquisition, installation policy; surveillance policies; o risk management; budget setting

i x
  • Essay
  •  • 2 pages • 
  • by rapidhelp • 
  • uploaded  05-06-2017
Quick View
i x

P1 & M1 - Explain the impact of different types of threat on an organisation and discuss information security

(3)
£3.82
11x  sold

Task 1: Create a leaflet which explains the following threats on organisation: 1. Potential threats: i. malicious damage; ii. Threats related to e-commerce; iii. Counterfeit goods; iv. Technical failures eg human error, theft of equipment 2. Malicious damage: i. Access causing damage eg viruses; ii. access without damage; iii. phishing, iv. identity theft, v. piggybacking, vi. hacking 3. Threats related to e-commerce: i. website defacement; ii. control of access to data via third p...

i x
  • Essay
  •  • 7 pages • 
  • by rapidhelp • 
  • uploaded  05-06-2017
Quick View
i x

P6 M3 D2 - Produce a proposal for an IT-enabled improvement to a business system, demonstrate originality in proposing this improvement, then fully justify the proposals.

(4)
£4.53
15x  sold

Scenario You are the IT manager for a medium-sized Clothing firm called “All Sports”, which employs 65 staff. You manage an IT administrator and two technicians. The firm makes Sports clothing to its own design. You have identified a problem in the organisation; the IT systems and equipment are out of date, slow and often unreliable. As a result, sales have fallen and the company is facing some potentially difficult times ahead. The business has been slow to move with the times. The accounts...

i x
  • Essay
  •  • 5 pages • 
  • by rapidhelp • 
  • uploaded  30-05-2017
Quick View
i x