ICT a2 Security Revision - detailed

Detailed descriptions and information all about secuirty, damage and back ups like RAID....good for a2 module revision

HideShow resource information
  • Created by: shaun
  • Created on: 01-12-11 14:17
Preview of ICT a2 Security Revision - detailed

First 178 words of the document:

Shaun Anglesey 13LL
Security
Security is put in place to help ensure the safety of a system
and to provide back up which could help you avoid possible
threats from your system. If security isn't available the
system could malfunction and this could lead to legal action,
loss of business, lack of confidence, loss of computer time
and loss of staff time, as they are needed to store and solve
any problems.
Threats
Fire, theft, viruses, Trojans, vandalism, white collar crime
and worms, power cut, floods, user error.
Two types of threat:
Accidental
Deliberate
Natural Disasters: Gales/Storms, Volcanoes,
Earthquakes, Floods. Tidal waves
Hardware Faults: Hard disk drive corrupts, electrical fault,
faulty software (bugs & errors)
THREATS CAN BE SHORT-TERM OR LONG-TERM
FIRE
Caused by faulty wiring, candles and incense sticks,
Smoking, paper catching on fire caused by heat,
electrical equipment prone to burst into flames (fan
not working in computer)

Other pages in this set

Page 2

Preview of page 2

Here's a taster:

Shaun Anglesey 13LL
Companies must ensure that data, hardware and software is
not lost or damaged. If data is lost or damaged there should be
disaster recovery systems to restore the data.
THERE ARE THREE CONSEQUENCES OF DATA, HARDWARE
OR SOFTWARE BEING DAMAGED.
Loss of business and income
Loss of reputation
Legal action
Recovering files - Prevention
Accidental loss relates to back-ups
A back up is a copy of files and data.…read more

Page 3

Preview of page 3

Here's a taster:

Shaun Anglesey 13LL
Monitor users
Create the security on system ­ what is accessible
Add or remove software
Give different people different access rights
Other forms of software security:
Biometrics ­ use a fingerprint scanner on a lock for a
door to restrict access and monitor movement
­ could be voice controlled, fingerprint or
retina.
Firewalls ­ a special environment set up
to trap a hacker logging in over remote
connections.…read more

Page 4

Preview of page 4

Here's a taster:

Shaun Anglesey 13LL
Prevention
Don't download unknown programs from the Internet
straight to hard disc. Only use reputable sources.
Write protect media so it can't be written onto
Don't copy illegal software
Use a virus scanning software and virus eradication
program. Make sure this is kept up to date with the latest
virus definitions ­ available from the Internet.…read more

Page 5

Preview of page 5

Here's a taster:

Shaun Anglesey 13LL
1.Verbal warning,
2.Written warning,
3.Fire them,
4.Prosecution
Disaster Recovery Plan
1. Planning ­ risk analysis, establish security procedures,
staff training
2. Monitor for possible problems, make staff responsible
if errors do occur
3.…read more

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all resources »