Preview

Unit 119 IT Security for users

Good Essays
Open Document
Open Document
914 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 119 IT Security for users
Unit 119: IT Security For Users

Outcome 1: Use appropriate methods to minimise security risks to IT systems and data
1 Identify security issues that may threaten system performance
There are many threats that can affect system performance. These can come from many sources e.g. software downloads, floppy disks, CD’s, DVD’s, attachments and the internet. The threats are installed over the internet and are called spyware and adware. It is also possible for the threats to be transmitted through emails, key loggers which get through firewalls. The most malicious software, this comes in lots of forms which is designed to damage and disrupt. It’s important in the surgery to follow the Information Security Policy, we use many different sources daily, by following the policy we are all reducing the threat to system performance

2 Take appropriate security precautions to protect IT systems and data
There are many precautions that can be taken to protect IT systems and data. These are as simple as:
 Never swapping passwords with others
 Failure to keep passwords secure
 Using ineffective passwords e.g. password1
 Download or attempt to download software
 Ensure all anti-virus software is up to date
 Run regular virus checks

3 Identify threats to information security associated with the widespread use of technology
The threats associated with the use of widespread technology are:
 Spam – for example when using a programme like Microsoft Outlook you have an address book with all saved email addresses, viruses etc. can gain access to these and use them to send spam emails to other via emails, the recipient is then at threat.
 Passwords – for example sharing passwords, insecure passwords, storing username and passwords in public web browsers. This makes your security level low giving easy access to hacker and viruses.
 Computers – for example when using a public computer it’s important to log out while the computer is unattended it’s very simple

You May Also Find These Documents Helpful

  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Is3110 Week3 Quiz

    • 347 Words
    • 2 Pages

    3. Malware Install antivirus software Theft Lock computer to desk or encrypt hard drive Network attacks Implement firewall…

    • 347 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Access to credentials through data theft, access to authenticated user session, attacker can do network eavesdropping, brute force attacks, dictionary attacks, cookie replay attacks…

    • 1000 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It is a common sense that systems and networks should be protected from the damage caused by Trojans, viruses, and Worms. Practices that can help to prevent infection include these:…

    • 546 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Ais Project

    • 1021 Words
    • 5 Pages

    (2)Because if your password is known by others, these people might log on the system to see what you do.…

    • 1021 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    unit 242

    • 658 Words
    • 3 Pages

    Threats to the system and information security can be things such as accidentally deleting a file and unauthorised access which may lead to theft of private details. Hackers and viruses also prove a huge threat to a system.…

    • 658 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Unauthorized access to data centers, computer rooms and wiring closets, servers must be shut down occasionally for maintenance causing network downtime, data can be easily lost or corrupt and recovering critical business functions may take too long to be useful.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Ethical Principles

    • 1391 Words
    • 6 Pages

    "Harm" means injury or negative consequences, such as undesirable loss of information, loss of property, property damage, or unwanted environmental impacts. This principle prohibits use of computing technology in ways that result in harm to any of the following: users, the general public, employees, and employers. Harmful actions include intentional destruction or modification of files and programs leading to serious loss of resources or unnecessary expenditure of human resources such as the time and effort required to purge systems of "computer viruses."…

    • 1391 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Opens up the possibility for hackers to commit fraud and launch spam and virus attacks.…

    • 1647 Words
    • 7 Pages
    Good Essays
  • Powerful Essays

    Danchev, d. (2003). Building and implementing a successful information security policy (P-7). Retrieved from: http://www.windowsecurity.com/pages/security-policy.pdf…

    • 1134 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Antivirus Programs

    • 299 Words
    • 2 Pages

    An antivirus program protects a computer against viruses by identifying and removing any computer virus found in memory, on storage media, or on incoming files. When you purchase a new computer, it often includes antivirus software. Antivirus programs work by scanning for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. In addition, many antivirus programs automatically scan files downloaded from the Web, e-mail attachments, opened files, and all types of removable media inserted in the computer (Karanos 201-205).…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    3) Privacy loss: Insecurity of databases and private information can cause leaking to the unauthorized user.…

    • 623 Words
    • 3 Pages
    Good Essays
  • Good Essays

    resources like memory or disk space. A virus can be annoying or it can cost you…

    • 1319 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    advantage of computer

    • 264 Words
    • 2 Pages

    5. Details such as bank records, can be hacked into, and thus your personal information is no longer as safe as it used to be.…

    • 264 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Disadvantage of Internet

    • 470 Words
    • 2 Pages

    · Since business dealings and financial transactions have become easier because of the internet another problem that has arisen is that people can now misuse your private information including financial details such as the credit card number. There have been cases of financial frauds and other problems that people have experienced following misuse of such sensitive information. Some unscrupulous individuals have been successful in creating viruses and links that once clicked can automatically…

    • 470 Words
    • 2 Pages
    Good Essays