100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
Previously searched by you
Summary C.P6 (PART 2) Produce a plan to protect an IT system that meets organisational and legislative requirements. | UNIT 7: IT SYSTEMS SECURITY AND ENCRYPTION | BTEC Computing$7.17
Add to cart
Summary C.P6 (PART 2) Produce a plan to protect an IT system that meets organisational and legislative requirements. | UNIT 7: IT SYSTEMS SECURITY AND ENCRYPTION | BTEC Computing
C.P6 Produce a plan to protect an IT system that meets organisational and legislative requirements.
UNIT 7: IT SYSTEMS SECURITY AND ENCRYPTION | BTEC Computing
P6 IT system protection plan
In this document, I will be producing a plan to protect an IT system. As the head of ‘IT Security’ at the company, I will need to develop and implement this
plan to ensure that the running of financial transactions over our software runs efficiently and securely.
Business Requirements
Within this plan, I will cover the following areas of the network: physical security, software-based security and, policies and procedures. By configuring the
following areas I will make sure that the security on the network is robust against hackers and internal misuse. Separate requirements include protecting
credit/debit card information through the use of encryption, HTTPS and SSL security, whilst ensuring it is protected against denial-of-service attacks as this
will make sure the system, software and website are always live and running.
Gantt Chart
November
December
Septembe
February
October
January
August
March
Tasks
April
June
May
July
r
Meeting with Mr Carter to discuss what types of measures should be put in place
Create documentation with business aims and requirements
Look at the methods which could be used in more detail
Write up a GDPR policy (PP)
Implement the GDPR policy (PP)
Setup CCTV, locks on server, switch and server rooms, and biometric systems to access
financial accounts (PS)
Buy and setup backup servers and off-site storage (PS)
Configure cloud storage solutions to include daily, weekly and monthly backups (PS, SB)
Write up an internet, email and network use policy (PP)
Remove ‘reset’ and ‘factory settings’ capabilities from software (PP)
Setup anti-virus and anti-malware software, and configure weekly scans (SB)
Ensure that Windows Defender is turned on and configured correctly (SB)
Check the Firewall monthly to ensure the correct ports are open/closed (SB)
Unit 7: IT Systems Security and Encryption
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller BTECcomputingANDbusiness. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $7.17. You're not tied to anything after your purchase.