Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Samenvatting

Summary Unit 7 Assignment 2

Beoordeling
3,7
(3)
Verkocht
8
Pagina's
8
Geüpload op
14-06-2018
Geschreven in
2017/2018

Throughout this report is the work of which achieved me the highest possible grade. All of my work was to distinction standard throughout the 2 year course. BTEC LEVEL 3 UNIT 7 P1,P2,P3,P4,P5,P6,M1,M2,M3,D1,D2

Instelling
Vak

Voorbeeld van de inhoud

Unit 7
Assignment 2
Pass Work (P4)
Security problems and guidelines
Disaster recovery policies
Disaster recovery policies state what actions are to be taken in an event whereby the
organisation has been impacted by a disaster [for more information on likely disasters its
effect of organisations refer to Unit 7 Assignment 1].
The disaster recovery policy will likely include the procedures for data relocation, use of
alternative sites, the hiring of additional of staff and equipment.
Typically organisations will be supported by appropriate levels of insurance to fund the
organisations recovery from the disaster.
If disaster recovery policies are not in place and a disaster occurs the organisation will have
a prolonged downtime and their reputation may be impacted [from losing the customer’s
information and data].
Updating of security procedures
Updates and reviews of security procedures should be carried out periodically, it is essential
to check the security policies for currency and to compare the policy against current
knowledge and new threats.
Both security and computer systems require frequent updating as advancements in security
[and threats] are being produced at a rapid pace, the updates which may need to be
implemented by the organisations systems security may have an impact on the
organisations current established system.
Typically the updates will need to be tested by the staff [who are responsible for the up
keeping of the organisation systems security] prior to being released across the entire
organisation.
Scheduling of security audits
Security audits of physical and networked systems will need to be carried out regularly
ensuring the current system is working as expected [and has no issues], typically the security
audits are carried out without the employees knowing when they’re going to be done -
proving the effectiveness of the systems in place.
Within network management, an audit of database and network logs provide a detailed look
upon the recurring issues – this can be used to highlight the organisations existing threats.
The audit is often combined with penetration testing, simulating a hacker or denial of
service attack to establish the soundness of the existing systems.
Some organisations will go as far as to employ staff with the prime objective of breaking
into the building to ensure their physical security put in place is adequate.
Codes of conduct

1|Page
Matthew Lloyd-Jones

,Unit 7
Assignment 2
Code of conducts are created to ensure the personnel who require access to a system are
legally binded to not take advantage of their access.
Employees are expected to sign, agree and adhere to the code of conduct which states on it
a variety of policies – the policies ensure the systems users will abide by rules which suit the
organisation and its security needs.
Organisations typically will include the following policies [in some form] within their code of
conduct:

 Email usage policy - This governs what subjects are deemed acceptable in the
sending of emails, the policy usually defines the acceptable size of attachments to be
sent and gives details as to the unacceptable activities such as sending data and
information to the organisations competitor.
 Internet usage policy - employees will usually have restricted access online –
ensuring employees are doing their work rather than playing games online or
accessing their social media accounts. The policy will also state what cannot be
downloaded online.
 Software acquisition and Installation policy – these policies are put in place to
prevent personal and unlicensed software from being installed into the system, upon
this it ensures there is no duplication of software. By having these policies in place
compatibility issues and potential malware from accessing the system are prevented.
Surveillance policies
Placing surveillance cameras [or an alternative piece of surveillance equipment] around the
work place within an organisation may cause unrest to the employees. Surveillance and
monitoring policies must clearly be defined to the employees and they must then agree to
the policy. The policy would include information such as, the reasons for the surveillance,
where it will be placed and what type of surveillance equipment is going to be used.
Risk management
Predicting possible issues and measuring the potential damage which can be caused to the
organisation [as a result of these issues] is essential in creating a strategy to minimise [or
eliminate] all threats to an organisation.
In managing the risks, organisations may decide to:

 Tolerate the potential risk and waste no time in coming up with a solution
 Minimise the likelihood of the risk occurring – for example purchasing an add-on
anti-virus software.
 Terminate the risk – stopping the virus.
 Transfer the risk by adapting the approach of the organisation.
Budget setting
Budget setting and the management of finances is essential in ensuring the organisation
does not overspend. It is of great importance to maintain an acceptable level of security

2|Page
Matthew Lloyd-Jones

, Unit 7
Assignment 2
within an organisation and in budgeting for organisational systems security you will need to
consider the following: The replacement of redundant equipment and software versions,
the cost of each audit, the training of staff, software licencing, the procurement of external
consultation and support, the staff wages relating to organisational systems security.




3|Page
Matthew Lloyd-Jones

Gekoppeld boek

Geschreven voor

Study Level
Publisher
Subject
Course

Documentinformatie

Heel boek samengevat?
Onbekend
Geüpload op
14 juni 2018
Aantal pagina's
8
Geschreven in
2017/2018
Type
SAMENVATTING

Onderwerpen

€5,31
Krijg toegang tot het volledige document:
Gekocht door 8 studenten

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Beoordelingen van geverifieerde kopers

Alle 3 reviews worden weergegeven
3 jaar geleden

5 jaar geleden

5 jaar geleden

May I just ask why you have rated this document 2 star?

6 jaar geleden

3,7

3 beoordelingen

5
1
4
1
3
0
2
1
1
0
Betrouwbare reviews op Stuvia

Alle beoordelingen zijn geschreven door echte Stuvia-gebruikers na geverifieerde aankopen.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
MatthewIT AQA
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
79
Lid sinds
8 jaar
Aantal volgers
61
Documenten
19
Laatst verkocht
1 jaar geleden

I studied IT (Business) for an Extended Diploma in a 2 year BTEC course; I finished the course achieving the best possible grade while my attendance was only 70%. I aimed and received nothing less than a distinction throughout my work, this is a great opportunity to use my work to your advantage. If you did not receive the information you were looking for upon purchasing my work feel free to message me and I will FOR FREE give you additional information. All the best, Matthew

Lees meer Lees minder
3,8

10 beoordelingen

5
3
4
3
3
3
2
1
1
0

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen