100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Unit 7 Organisational Systems Security (Part 1 of 2) $21.34   Add to cart

Essay

Unit 7 Organisational Systems Security (Part 1 of 2)

4 reviews
 645 views  3 purchases
  • Course
  • Institution

Unit 7 Organisational Systems Security (P1, P2, P3, M1, M2) Explain the impact of different types of threat on an organisation (P1) Describe how physical security measures can help keep systems secure (P2) Describe how software and network security can keep systems and data secure (P3) Discuss...

[Show more]

Preview 1 out of 10  pages

  • May 3, 2017
  • 10
  • 2016/2017
  • Essay
  • Unknown
  • Unknown

4  reviews

review-writer-avatar

By: Lb2200 • 4 year ago

review-writer-avatar

By: dinarte1999 • 7 year ago

review-writer-avatar

By: martynsmacas • 7 year ago

review-writer-avatar

By: shayaan1994 • 7 year ago

avatar-seller
Unit 7: Assignment 1 – PIX Security Systems
Scenario
I work as a junior technician for PIX Security Systems which provides network security con-
sultancy services to small and medium sized organisations. My senior security consultant
has asked me to prepare a user guide to provide help and guidance on security issues.


Explain the impact of different types of threat on an organisation (P1)
Internal Threats
Scanners – There are loads of different ways used by people to attack systems using
scanners. People can download scanners from the internet so they can scan addresses and
obtain information about transmission control protocol ports. People can find IP addresses
by mapping using domain name system. Hackers use this tactic making sure what systems
are active and ready to hack.
Range of Addresses - This is a scanner which is fairly easy to use, its fast and visual at
scanning when it searches for multiple addresses in the angry IP scanner.
Man in The Middle – This is attack is when a malicious person puts himself/herself into a
talk amongst two individuals. Then this person pretends to be both individuals and gets the
access to the information they were attempting to transfer amongst themselves. Man in the
middle attack lets a user steal, send and get data that was meant to be sent to someone
else or not meant to be sent at all. Without either of the two individuals knowing until it is
too late to do anything about it. Man in the middle is a type of eavesdropping attack also
exposes the people private chat or other data and also the real time processing of
transactions.
Magic Disk Tactics - They are known to be boot disks for the use of restarting the computer
and undermine the operating system. There are some very good magic disks for example
the ultimate boot CD that can solve issues of viruses and Trojans, drive, hardware and
operating system failures. But to avoid anyone using a magic disk you have to make sure a
password is on the lock of the basic input/output system and also USB sticks, floppy disks
and CD/DVDs should not be used as boot devices.
Key logging - Key loggers are applications that are used to record key stroke, also can be
used for mouse activities then IT sends the information to a file or in some case that is
normally used in a remote network location. They are very hard to track because they are
hidden, but they can be found using anti-virus software application.
Denial of Service – Denial of service there are loads of them, the one that is used the most is
the denial of service attack which simply transmits loads of traffic to a certain network
address, much more than the programmers who organised the data buffers expected
someone would transmit and then this overflows the traffic and it just simply crashes. The
attacker might know that system they are attacking has a shortcoming that can be
uncovered or the aggressor may essentially attempt the assault on the off chance that he
gets fortunate and it works.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller 1999b. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $21.34. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67096 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$21.34  3x  sold
  • (4)
  Add to cart