100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Summary AB.D1 Evaluate the effectiveness of the techniques used to protect organisations from security threats while taking account of the principles of information security and legal requirements. | UNIT 7: IT SYSTEMS SECURITY AND ENCRYPTION | BTEC Computing

Rating
3.0
(2)
Sold
16
Pages
4
Uploaded on
28-03-2021
Written in
2018/2019

AB.D1 Evaluate the effectiveness of the techniques used to protect organisations from security threats while taking account of the principles of information security and legal requirements. UNIT 7: IT SYSTEMS SECURITY AND ENCRYPTION | BTEC Computing

Show more Read less
Institution
Course








Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Study Level
Examinator
Subject
Unit

Document information

Uploaded on
March 28, 2021
Number of pages
4
Written in
2018/2019
Type
Summary

Subjects

Content preview

D1 Effectiveness of techniques
to protect against security
threats
Introduction

In this document I will be evaluating the effectiveness of the techniques used to protect our
organisation from security threats. The principles of information security and the legal requirements
are also important and will be considered in this document.

Security threats

There are a number of threats the company could face and we will need to use effective methods to
stop/mitigate the effects of them. Internal threats, such as employees gaining access to highly
confidential information, need to be prevented as if the banking details got into the wrong hands
they could be used for fraudulent activities. There are two main techniques which could be used to
protect against this type of attack, these are: having passwords and codes on certain files (File/folder
access controls) to protect files on the company network and having an access control system for
staff so that only certain employees can enter rooms which contain highly confidential information
customers private and banking details. Both these methods are classed as physical security and can
protect against security threats as they restrict the number of people who have access to this data,
meaning if someone just walked into the company building they wouldn’t have access to anything,
whilst only authorised staff members would have access to the data. To further improve the physical
security, we could install CCTV cameras around our building and offices, so that we could monitor
our site 24 hours a day, whilst having automatic
locking doors (part of the access control) on the server
room would prevent any damage or theft of the data
inside that room.

Physical Security: 8/10 | Overall, these methods of
physical security will be effective in protecting against
security threats as they will mitigate the chances of
someone, who shouldn’t have access to information,
looking or gaining data. They also meet the
requirements of the principles of confidentiality and availability but could be prone to social
engineering; for example, an employee getting manipulated into giving his password or information
about clients away.

An additional threat includes external threats - those which come from outside the company. This
type of threat poses a bigger danger to our security as it would be harder to track down the
perpetrator and, because the software often used is hidden, it is harder to know when an attack has
occurred. To counter this threat, we will need to implement both hardware and software security -
these take the shape of anti-virus software and firewalls. On our systems we will need to use anti-
virus software as this will allow us to detect and destroy any computer virus. This is important as
viruses would destroy or steal data, and corrupt the computer system, so it is integral to use such
software to protect the confidential information we hold. To insure the highest protection against


Unit 7: IT Systems Security and Encryption

Reviews from verified buyers

Showing all 2 reviews
2 year ago

3 year ago

3.0

2 reviews

5
0
4
0
3
2
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
BTECcomputingANDbusiness
Follow You need to be logged in order to follow users or courses
Sold
248
Member since
5 year
Number of followers
160
Documents
30
Last sold
7 months ago

3.9

57 reviews

5
26
4
13
3
10
2
5
1
3

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions