Personal Folder of BTEC L3 IT Practitioners (Achived D*DD)
Former CANDI student studying Computer Forensics in Middlesex University. Achieved D*DD in BTEC L3 Extended Diploma in IT Practitioners. Work inspired by others and own research, only uploading theoretical documents.
I'd like to stress the fact that you should not completely copy the work, but use the provided work as a guide to what you need to write.
If you have any queries, feedback, or anything else. Feel free to send me a message and I'll reply as soon as possible!
- 75
- 0
- 1
Community
- Followers
- Following
65 Reviews received
76 items
P1 - Describe the technologies required for e-commerce
Explain the technologies required for e-commerce and which might be needed by Cuckoo.
Grading tip
Technologies include the hardware, software and networking needed for e-commerce. Make sure you consider all elements. Discuss both the ones you choose for Cuckoo and those you discard.
Technologies: hardware and software e.g. web servers, browsers, server software, web authoring tools, database system; networking e.g. TCP/IP addresses, ports and protocols; considerations e.g. domain names, multiple...
- Essay
- • 4 pages •
Explain the technologies required for e-commerce and which might be needed by Cuckoo.
Grading tip
Technologies include the hardware, software and networking needed for e-commerce. Make sure you consider all elements. Discuss both the ones you choose for Cuckoo and those you discard.
Technologies: hardware and software e.g. web servers, browsers, server software, web authoring tools, database system; networking e.g. TCP/IP addresses, ports and protocols; considerations e.g. domain names, multiple...
P6 - Review the laws related to security and privacy of data
c.	Review the laws related to security and privacy of data. In your report you should consider:

	legislation eg Computer Misuse Act 1990;
	Copyright, Designs and Patents Act 1988; 
	privacy and compensation requirements of Data Protection Act 1984, 1998, 2000

- Essay
- • 3 pages •
c.	Review the laws related to security and privacy of data. In your report you should consider:

	legislation eg Computer Misuse Act 1990;
	Copyright, Designs and Patents Act 1988; 
	privacy and compensation requirements of Data Protection Act 1984, 1998, 2000

P3 - Describe how software and network security can keep systems and data secure
2.	Task 2a: Describe HOW the use of the following software and network security can keep systems and data secure.
o	encryption techniques eg public and private key; 
o	diskless networks; 
o	use of backups; 
o	audit logs; 
o	firewall configuration; 
o	virus checking software; 
o	use of virtual private networks (VPN); 
o	intruder detection systems; 
o	passwords; 
o	levels of access to data; 
o	software updating; 
o	disaster recovery eg backup systems, whole system replacement, tiers of recovery
- Presentation
- • 14 pages •
2.	Task 2a: Describe HOW the use of the following software and network security can keep systems and data secure.
o	encryption techniques eg public and private key; 
o	diskless networks; 
o	use of backups; 
o	audit logs; 
o	firewall configuration; 
o	virus checking software; 
o	use of virtual private networks (VPN); 
o	intruder detection systems; 
o	passwords; 
o	levels of access to data; 
o	software updating; 
o	disaster recovery eg backup systems, whole system replacement, tiers of recovery
P2 - Describe how physical security measures can help keep systems secure
1.	Task 1: Describe HOW could the use of the following security measures help keep systems secure: 
	
	(locks; visitors passes; sign in/out systems; biometrics eg retinal scans, fingerprint, voice recognition; guards, cable shielding).

- Essay
- • 3 pages •
1.	Task 1: Describe HOW could the use of the following security measures help keep systems secure: 
	
	(locks; visitors passes; sign in/out systems; biometrics eg retinal scans, fingerprint, voice recognition; guards, cable shielding).

D1 - Discuss different ways of recovering from a disaster
Investigate disaster recovery options how and when they would be used and discuss different ways of recovering from a disaster.
- Essay
- • 2 pages •
Investigate disaster recovery options how and when they would be used and discuss different ways of recovering from a disaster.
M3 - Explain the role of ethical decision making in organisational IT security
d.	Building on the previous task explain the role of ethical decision making in organisational IT security providing evidence that you have given real consideration to the issues involved and come to a decision about how to deal with them.		

Ethical decision-making: 
	freedom of information versus personal privacy (electoral roll, phone book and street maps put together); 
	permission eg to use photographs or videos, CCTV footage

- Essay
- • 2 pages •
d.	Building on the previous task explain the role of ethical decision making in organisational IT security providing evidence that you have given real consideration to the issues involved and come to a decision about how to deal with them.		

Ethical decision-making: 
	freedom of information versus personal privacy (electoral roll, phone book and street maps put together); 
	permission eg to use photographs or videos, CCTV footage

P5 - Explain how employment can affect security
b.	Explain how employment contracts can affect security considering the following 		

•	hiring policies 
•	separation of duties
•	ensuring compliance including disciplinary procedures
•	training and communicating with staff as to their responsibilities

- Essay
- • 2 pages •
b.	Explain how employment contracts can affect security considering the following 		

•	hiring policies 
•	separation of duties
•	ensuring compliance including disciplinary procedures
•	training and communicating with staff as to their responsibilities

P4 - Explain the policies and guidelines for managing organisational IT security issues
a. Write a report explaining the policies and guidelines employed by an organisation to manage IT Security issues. 

Security policies and guidelines: 
o	disaster recovery policies; 
o	updating of security procedures; 
o	scheduling of security audits; 
o	codes of conduct eg email usage policy, internet usage policy, software acquisition, installation policy; surveillance policies; 
o	risk management; budget setting

- Essay
- • 2 pages •
a. Write a report explaining the policies and guidelines employed by an organisation to manage IT Security issues. 

Security policies and guidelines: 
o	disaster recovery policies; 
o	updating of security procedures; 
o	scheduling of security audits; 
o	codes of conduct eg email usage policy, internet usage policy, software acquisition, installation policy; surveillance policies; 
o	risk management; budget setting

P1 & M1 - Explain the impact of different types of threat on an organisation and discuss information security
Task 1: Create a leaflet which explains the following threats on organisation:

1.	Potential threats: 
i.	malicious damage;
ii.	Threats related to e-commerce; 
iii.	Counterfeit goods; 
iv.	Technical failures eg human error, theft of equipment

2.	Malicious damage: 
i.	Access causing damage eg viruses; 
ii.	access without damage; 
iii.	phishing, 
iv.	identity theft, 
v.	piggybacking, 
vi.	hacking

3.	Threats related to e-commerce: 
i.	website defacement; 
ii.	control of access to data via third p...
- Essay
- • 7 pages •
Task 1: Create a leaflet which explains the following threats on organisation:

1.	Potential threats: 
i.	malicious damage;
ii.	Threats related to e-commerce; 
iii.	Counterfeit goods; 
iv.	Technical failures eg human error, theft of equipment

2.	Malicious damage: 
i.	Access causing damage eg viruses; 
ii.	access without damage; 
iii.	phishing, 
iv.	identity theft, 
v.	piggybacking, 
vi.	hacking

3.	Threats related to e-commerce: 
i.	website defacement; 
ii.	control of access to data via third p...
P6 M3 D2 - Produce a proposal for an IT-enabled improvement to a business system, demonstrate originality in proposing this improvement, then fully justify the proposals.
Scenario
You are the IT manager for a medium-sized Clothing firm called “All Sports”, which employs 65 staff. You manage an IT administrator and two technicians. The firm makes Sports clothing to its own design. You have identified a problem in the organisation; the IT systems and equipment are out of date, slow and often unreliable. As a result, sales have fallen and the company is facing some potentially difficult times ahead. The business has been slow to move with the times. The accounts...
- Essay
- • 5 pages •
Scenario
You are the IT manager for a medium-sized Clothing firm called “All Sports”, which employs 65 staff. You manage an IT administrator and two technicians. The firm makes Sports clothing to its own design. You have identified a problem in the organisation; the IT systems and equipment are out of date, slow and often unreliable. As a result, sales have fallen and the company is facing some potentially difficult times ahead. The business has been slow to move with the times. The accounts...
P2 & D1 - Explain and evaluate the impact of IT developments on an organisation
M1 - Compare the features and functions of different operating systems
Not what I needed
P4 - Explain how an organisation can manage risk when using IT technology
D1 - Discuss different ways of recovering from a disaster
D1 - Evaluate the impact of evolving output mediums on the design and creation of graphic images