100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Unit 7 – Organisational Systems Security, Assignment 3: Reviewing the Issues $7.73   Add to cart

Essay

Unit 7 – Organisational Systems Security, Assignment 3: Reviewing the Issues

 1 view  0 purchase
  • Course
  • Institution

Ensuring the security of computer systems and, crucially, the information they need is vital. Organisations and customers require confidence in these matters and security is critical to the successful deployment and use of IT. In this unit learners will consider physical security of computer system...

[Show more]

Preview 2 out of 9  pages

  • March 7, 2023
  • 9
  • 2022/2023
  • Essay
  • Unknown
  • A+
avatar-seller
Unit 07 – Organisational Systems
Security
ASSIGNMENT 3: REVIEWING THE ISSUES

Policies, guidelines and employment contracts used to
manage IT security issues
 Disaster recovery policies

These rules are described as a strategy that is carried out in a business in the event of an emergency. A
disaster recovery plan might state, for instance, that Rockin Records has had an earthquake, fire, or
flood. Rockin Records must adhere to the recovery policy plan, which is a backup strategy. The backup
will stop the organisation from losing its valuable data. Rockin Records must have a procedure in place
for regularly creating backups of all the data and this data must be stored off site.

 Updating of security procedures

To ensure that all of Rockin Records' servers and software are running smoothly and without errors,
Rockin Records must download the most recent server updates every four weeks. The most recent
Windows update guarantees that everything on the server is safe, up-to-date, and working properly.
Updating their antivirus software is another item a business should think about. By avoiding unwanted
threats like viruses, trojans, and malware from affecting the company's network and causing further
harm, this will benefit the business. Rockin Records will finally be updated to the most recent version,
which will be used since it will be software versions that will provide them extra ones and also fix any
features that were on the system prior to updating it that had flaws. If it isn't updated, hackers can enter
the user's computer and steal data or upload viruses to Rockin Records.

 Scheduling of security audits

There is a schedule for security audits when security needs to be integrated into things like computer
hardware, software, and physical security. When a company locks its servers behind a door that can only
be opened with an RFID card, it is demonstrating physical security. This prevents unauthorised access.
The company must ensure that the software's content is clear of viruses. Rockin Records should have a
set of guidelines to assess things against if dangerous dangers are converging so they can halt them
before they get worse and start to hurt the company. The audit review is necessary as a result of
changes to the business' infrastructure, such as a move by Rockin Records, the installation or upgrading
of a new system, or the use or updating of a new application. After updating the operating system (OS)
or installing a new OS. Rockin Records must perform a security audit every three months and at the very
least a basic check each month to be safe to check for n

 Codes of conduct
o email usage policy

Anyone at Rockin Records who needs access to the network must sign a statement acknowledging their
understanding of the corporate code of conduct. For a contract to be enforceable in court, it must be

, made orally. To ensure that it covers everything, the contract must have a variety of restrictions. To
specify what purposes employees may use email in the workplace and what kinds of files they may
receive or send, this policy should include email usage guidelines.

o Internet usage policy

All Rockin Records staff members are required to abide by the Internet Use Policy as well. No employee
shall access any websites that are improper for work, include unlawful material, or are virus-infected,
according to the first Internet usage policy. Viral infections quickly and uncontrolled spread throughout
all desktops and computers, causing data loss or harm to information that is held for both customers
and the organisation. Another guideline states that no employee may visit social networking websites
like Facebook or Instagram or play games on the Internet while at work. Rockin Records will act to
reduce and limit the employee's internet access after finding out about it in the audit logs the company
keeps. Another guideline is that no employee may unlock firewall settings, which protects against
viruses and Trojans that could destroy the business. An additional restriction is that no employee should
change a browser's settings because doing so could expose them to responsibility and cost a lot of
money to fix because the settings can be changed to fit the demands of the department head.

o Software acquisition

The purchase of software is another type of policy that should be followed in any firm. All Rockin
Records personnel are required to abide by this policy, and it must be watched over. The most
significant or crucial regulation or policy is this method. This is since the guide outlines the software
installation process on computers within an organisation. No employee shall use any software or
programmes that are not properly licenced, according to the first rule. If an employee is observed doing
this, their access to the workplace may be blocked. This is because when they download unauthorised
software, they put the company at risk because the software could be contaminated with viruses or
Trojan horses that can ruin data and disrupt the system. The possibility of a hacker infiltrating the
system and making changes remotely is also very real. Utilizing legally obtained software that has been
extensively examined, verified to be bug-free, and given the go-ahead for use by companies, institutions,
or organisations is the only solution as a result. that may cause data and the system harm.

o Installation policy

When unapproved computer software and programmes, including files downloaded and opened via the
Internet, are installed, security flaws can proliferate quickly and easily. Unauthorized software, including
those offered by reputable companies and well-known suppliers, may be infected with Trojan horses
and other malware that helps hackers steal critical information. This procedure's essential component,
the following software installation policy, focuses on safeguarding Rockin Records' computers, systems,
data, and communications from unauthorised access and averting data loss.

The purpose of this policy is to ensure that every employee, temporary employee, and volunteer is
aware of the exact requirements for installing and using software, programmes, and applications on
company-provided computers, systems, and networks and that they agree to abide by them.

 Surveillance policies
 Policies governing surveillance are used when employees of a corporation are observed.
Installing a security camera system allows Rockin Records to keep an eye on all activity and

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller yar1. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $7.73. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67474 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$7.73
  • (0)
  Add to cart