100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Unit 7 System Security and Encryption (Distinction Grade) $4.49   Add to cart

Essay

Unit 7 System Security and Encryption (Distinction Grade)

 26 views  0 purchase
  • Course
  • Institution

*Distinction grade* Work certified.

Preview 2 out of 7  pages

  • June 24, 2023
  • 7
  • 2022/2023
  • Essay
  • Unknown
  • A
avatar-seller
M3. Justify the choice of protection techniques used to defend the
IT systems of an organisation, showing how its IT system will be
protected from security threats.
An advantage of access controls is that it provides security. This is because it can prevent
unauthorised access from employees to the IT systems. However, it is possible that they can
mistakenly give the wrong access control to the employee which can create a negative impact.
Another advantage is that it can protect the data. They can limit the data that employees will be able
to see. On the other hand, a disadvantage of this is that it can still create inside threats as employees
can do something malicious with the access control that they have. Overall, the benefits of access
control in securing IT systems exceed the drawbacks. However, access control mechanisms must be
carefully designed and implemented.

An advantage of wireless security is that it can be convenient. This is because they don’t need to buy
or purchase wires for the IT systems to be protected. However, a disadvantage is that it can still
create security risks. This is because the IT systems are not directly connected to each other which
allows third parties to intercept the connection and create a threat or an attack. Another advantage
is that it allows the organisation to be more mobile. This is because the devices and systems are not
wired and thus allowing them to work in different locations. On the other hand, a disadvantage of
this is there is a limited range for the systems. This is because the signal of the wireless connection
may get blocked or interrupted which can disconnect the system and may produce a security threat.
While wireless networks provide various benefits, organisations must carefully develop and execute
comprehensive wireless security measures to mitigate the related dangers. A complete approach
that includes robust encryption, access controls, intrusion detection systems, and frequent security
assessments is critical for ensuring the security and integrity of IT systems.

An advantage of group policies is that it makes the organisation easier to manage. This is because
they have access to the control of security settings of the employee's accounts which allows them to
modify it to the organisation's requirements. However, a disadvantage of this is that it may have a
lot of restrictions. This makes it frustrating for some employees as they may not be able to have
access to the data they need. Another advantage is that it is efficient. This is because the group
policies make it undemanding for managing the security settings as they don’t have to individually
change the settings on each computer which makes it more times saving for the organisation. On the
other hand, another disadvantage is that it may progressively be more complicated. This is because
the group policies may increase as time passess which can make it more difficult for the IT systems
to be managed. Overall, group policies provide considerable benefits for IT system security by
providing centralised management, standardisation, and efficient enforcement of security settings.
Organisations, on the other hand, should spend in adequate planning, design, and continuing
administration to maximise the benefits of group policies while avoiding potential downsides and
traps.

M4. Enhance the protection of the IT system which to meet
requirements given in the plan.
Firewall Configuration

,

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller ComputingWithX. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $4.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67474 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$4.49
  • (0)
  Add to cart