Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Essay

Unit 7 System Security and Encryption (Distinction Grade)

Rating
-
Sold
-
Pages
7
Grade
A
Uploaded on
24-06-2023
Written in
2022/2023

*Distinction grade* Work certified.

Institution
Course

Content preview

M3. Justify the choice of protection techniques used to defend the
IT systems of an organisation, showing how its IT system will be
protected from security threats.
An advantage of access controls is that it provides security. This is because it can prevent
unauthorised access from employees to the IT systems. However, it is possible that they can
mistakenly give the wrong access control to the employee which can create a negative impact.
Another advantage is that it can protect the data. They can limit the data that employees will be able
to see. On the other hand, a disadvantage of this is that it can still create inside threats as employees
can do something malicious with the access control that they have. Overall, the benefits of access
control in securing IT systems exceed the drawbacks. However, access control mechanisms must be
carefully designed and implemented.

An advantage of wireless security is that it can be convenient. This is because they don’t need to buy
or purchase wires for the IT systems to be protected. However, a disadvantage is that it can still
create security risks. This is because the IT systems are not directly connected to each other which
allows third parties to intercept the connection and create a threat or an attack. Another advantage
is that it allows the organisation to be more mobile. This is because the devices and systems are not
wired and thus allowing them to work in different locations. On the other hand, a disadvantage of
this is there is a limited range for the systems. This is because the signal of the wireless connection
may get blocked or interrupted which can disconnect the system and may produce a security threat.
While wireless networks provide various benefits, organisations must carefully develop and execute
comprehensive wireless security measures to mitigate the related dangers. A complete approach
that includes robust encryption, access controls, intrusion detection systems, and frequent security
assessments is critical for ensuring the security and integrity of IT systems.

An advantage of group policies is that it makes the organisation easier to manage. This is because
they have access to the control of security settings of the employee's accounts which allows them to
modify it to the organisation's requirements. However, a disadvantage of this is that it may have a
lot of restrictions. This makes it frustrating for some employees as they may not be able to have
access to the data they need. Another advantage is that it is efficient. This is because the group
policies make it undemanding for managing the security settings as they don’t have to individually
change the settings on each computer which makes it more times saving for the organisation. On the
other hand, another disadvantage is that it may progressively be more complicated. This is because
the group policies may increase as time passess which can make it more difficult for the IT systems
to be managed. Overall, group policies provide considerable benefits for IT system security by
providing centralised management, standardisation, and efficient enforcement of security settings.
Organisations, on the other hand, should spend in adequate planning, design, and continuing
administration to maximise the benefits of group policies while avoiding potential downsides and
traps.

M4. Enhance the protection of the IT system which to meet
requirements given in the plan.
Firewall Configuration

,

Written for

Study Level
Examinator
Subject
Unit

Document information

Uploaded on
June 24, 2023
Number of pages
7
Written in
2022/2023
Type
ESSAY
Professor(s)
Unknown
Grade
A

Subjects

$5.42
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
ComputingWithX
3.0
(2)

Get to know the seller

Seller avatar
ComputingWithX Abacus College, Oxford
Follow You need to be logged in order to follow users or courses
Sold
7
Member since
2 year
Number of followers
2
Documents
4
Last sold
9 months ago
ComputingWithX

All about computing and that \\\'nerdy\\\' stuff.

3.0

2 reviews

5
0
4
0
3
2
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions