100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Summary

Summary CD.D3 Demonstrate individual responsibility and effective selfmanagement in the planning and protection of an IT system. UNIT 7: IT SYSTEMS SECURITY AND ENCRYPTION | BTEC Computing

Rating
4.5
(2)
Sold
10
Pages
14
Uploaded on
28-03-2021
Written in
2018/2019

CD.D3 Demonstrate individual responsibility and effective self-management in the planning and protection of an IT system. UNIT 7: IT SYSTEMS SECURITY AND ENCRYPTION | BTEC Computing

Institution
Course









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Study Level
Examinator
Subject
Unit

Document information

Uploaded on
March 28, 2021
Number of pages
14
Written in
2018/2019
Type
Summary

Subjects

Content preview

D3 Responsibility and self-management
Introduction

In this document, I will be demonstrating the different ways I have shown individual responsibility
and self-management. Both these will need to have been done effectively to ensure the planning
and protection of the IT system is carried out to offer the highest level of defence against both
external and internal threats.
Planning and recording

Throughout the process of developing the IT system security, I have planned out each stage so that it
covers every aspect of security - this includes physical and software security, and evolving policies
and procedures. By doing this planning, I made sure that I didn’t miss any parts of the network that
need protecting. The use of a Gantt chart allowed me to set time -based targets, which ensured that
every protection method would be undertaken in a formally fashion. Recording the work undertaken
was carried out at every stage, with documents and screenshots displaying what had been done to
enhance the security on the system. Feedback from others was collected in many ways, the first was
having weekly meetings to discuss the progress that had been made on certain projects and monthly
meetings to review and edit policies. These meetings were attended by members of management,
whilst emails were how other members of staff were able to get in contact with me. The feedback
gathered took many forms, with emails, meeting minutes and face -to-face conversations allowing
me to plan and record what work I needed to do next.




Figure 1.0: Gantt chart Figure 1.1: Progress table

Reviewing

To ensure that the protection applied to the network was effective, I had to undertake several
reviews and tests. These made sure that everything had been set up to the highest level and was
robust enough to stand up against external and internal threats. Involved within this was responding
to any issues that occurred, for example, finding that a firewall port was open - when it's not meant
to be - and closing it before any damage is caused. I also took feedback from fellow IT professionals;
this allowed me to be sent any issues that arose, fixing them and resolving the issue. My reviewing
process involved going through a number of tasks to identify any weaknesses in the system - this
was effective as it covered all aspects and scenarios on the network. Foll owing this, I wrote a
conclusion which looked over what was implemented and how it performed in the test. I found that




Unit 7: IT Systems Security and Encryption

, all my methods thoroughly protected the system without hindering the systems everyday use (e.g.
visiting certain websites, accessing certain folders).




Figure 2.0: Testing table Figure 2.1: Email

Professionalism

During my time working on the IT system, I had to maintain a level of professionalism which saw me
perform tasks as quickly as I could, whilst remaining calm in these under-pressure situations. When
undertaking this work, I had to use specific terminology with others to ensure they knew exactly
what I was talking about and the complexity of each task. In addition, I used formal language to
remain presentable, polite and professional - this was most evident in my emails, which show me
using formal language to ask and answer questions from colleagues. When answering emails from
others I had to be supportive to ensure their issues could be resolved, whilst showing leadership by
making clear I was the person to talk to if staff came across any problems with the IT system.
Anything that went wrong on the system was my responsibility, meaning I was accountable for
anything that happened. For this reason, I had to make sure that everything was configured correctly
to prevent liability to problems.




Figure 3.0: Email Figure 3.1: Email

Outcomes

In order to make recommendations or decisions I had to go through a number of different tests.
These involved checking whether protection techniques have worked by looking at all avenues and
testing using varied techniques. By going through I ensured that me final decision was high-quality or
that the recommendation had systematic evidence behind it. To ensure all outcomes were high-
quality, I had to change anything that could be seen as a weakness - this maintains the highest level
of protection and makes sure that all recommendations are fully justified. Decisions had to always
be based upon what was best to do, for example, closing Firewall ports and blocking certain
connections made sure that no external hackers could gain access to the network. When in
meetings, we would discuss what things could be changed/or added - talking about their benefit -


Unit 7: IT Systems Security and Encryption

Reviews from verified buyers

Showing all 2 reviews
1 year ago

3 year ago

4.5

2 reviews

5
1
4
1
3
0
2
0
1
0
Trustworthy reviews on Stuvia

All reviews are made by real Stuvia users after verified purchases.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
BTECcomputingANDbusiness
Follow You need to be logged in order to follow users or courses
Sold
248
Member since
5 year
Number of followers
160
Documents
30
Last sold
7 months ago

3.9

57 reviews

5
26
4
13
3
10
2
5
1
3

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions