100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
BTEC LEVEL 3 Unit 7 organisational systems security $13.59   Add to cart

Essay

BTEC LEVEL 3 Unit 7 organisational systems security

11 reviews
 2101 views  26 purchases
  • Course
  • Institution
  • Book

BTEC LEVEL 3 UNIT 7 P1,P2,P3,P4,P5,P6,M1,M2,M3,D1,D2

Last document update: 6 year ago

Preview 3 out of 18  pages

  • August 15, 2017
  • April 18, 2018
  • 18
  • 2015/2016
  • Essay
  • Unknown
  • Unknown

11  reviews

review-writer-avatar

By: michaellane602 • 4 year ago

reply-writer-avatar

By: xeon • 3 year ago

Thanks for your review.

review-writer-avatar

By: nvenus58 • 5 year ago

poor condition

reply-writer-avatar

By: xeon • 3 year ago

Hey, thanks for your review. How can the document be improved?

review-writer-avatar

By: benwotsits • 5 year ago

reply-writer-avatar

By: xeon • 5 year ago

How can it be improved? Thanks.

review-writer-avatar

By: kash100 • 5 year ago

review-writer-avatar

By: zakkaz33 • 5 year ago

reply-writer-avatar

By: xeon • 5 year ago

Thanks for the review.

review-writer-avatar

By: yusufgax23 • 6 year ago

Translated by Google

gg

reply-writer-avatar

By: xeon • 6 year ago

Thanks for your review.

review-writer-avatar

By: tingyting • 6 year ago

reply-writer-avatar

By: xeon • 6 year ago

What was the issue with the work?

Show more reviews  
avatar-seller
UNIT 7
P1 - Explain the impact of difeeent types of theeat on an
oeganisaton
Malwaee ataccss

Malware are programs which are made to disrupt computer systems. Malware ataccs are also able to
tace classifed iinformatoin from a user’s computer. Malware ataccs cain compromise the busiiness’s
iinformatoin aind data. Malware cain come from email atachmeints, or fles which have beein executed oin
a computer, such as from a USB memory stcc. Aer the program is ruininiing the malware will proceed to
disrupt the system. The impact of malware ataccs is that because data is lost or stolein, Breint
Commuinity Health Ceintre’s reputatoin will also be ruiined, because customers will inot be williing to trust
them ainymore. Malware is also able to set limitatoins to what a user cain access oin their user profle,
which meains it will impact the employee oin doiing their worc or tascs for Breint Commuinity Health
Ceintre.



Inteenal

Iinterinal data threat is a risc to Breint Commuinity Health Ceintre, because if data was to be stolein, leaced,
deleted, terrorist ataccs, threats from emails aind much more. This cain happein if ain employee puts a
USB memory stcc ointo oine of the computers aind ruininiing malware which will thein spread across the
inetworc, the reasoins why ain employee may do this is because they may inot lice the busiiness or for
their owin persoinal gaiin such as selliing iinformatoin for moiney, if this was to happein it would have a
inegatve impact oin the busiiness because data of the busiiness was leaced, which would worry customers
if the customer’s data was comprised also.



Exteenal

Exterinal data threat to Breint Commuinity Health Ceintre is data theA, server failure, Deinial of service,
humain error, redirectoin, spam, defacemeint, deleting of data, aind phishiing. These threats could have a
massive impact oin Breint Commuinity Health Ceintre aind their customers. Deinial of service (DOS) occurs
whein a server receives too much requests iin oine period, iin which the server is uinable to haindle it aind
the server einds up crashiing. Redirectoin occurs whein the Breint Commuinity Health Ceintre’s website was
to redirect to ainother website which may cointaiin viruses, so if a user was to go oin the website it could

,damage the computer. Phishiing is whein people impersoinate ainother website to steal customer’s
iinformatoin.




Theeats to Beent community health centee

websites let storiing of iinformatoin oin the servers such as customer iinformatoin, which could be stolein if
malware einters the system. Malware ataccs iinclude of: data theA (iinformatoin of customers lice credit
card iinformatoin beiing stolein.), impersoinatoin (whein website ataccers mace a copy of ainother website
which fools customers of einteriing their persoinal iinformatoin, iin which this iinformatoin is misused, to
gaiin credit card iinformatoin e.g.), deinial of service (whein the server is overloaded at oine period which
causes the server to crash, iin which customers are uinable to access the website which will have a
inegatve impact oin Breint Commuinity Health Ceintre because customers may be oin their website to get
the phoine inumber to call up Breint Commuinity Health Ceintre, but because the server is overloaded, the
website is ofiine aind the customers caininot get the iinformatoin they ineed. redirectoin, aind more. This
Breint Commuinity Health Ceintre will eind up losiing customers because they will be uinhappy with the
issues Breint Commuinity Health Ceintre has, aind Breint Commuinity Health Ceintre will have costs to fx
the possible problem(s). These ataccs oin Breint Commuinity Health Ceintre cain happein by someoine
withiin the orgainisatoin or inot.

Haedwaee

Threats to hardware iinclude damagiing whein iinstalliing, theA or inatural disasters. TheA cain happein by
crimiinals breaciing iinto Breint commuinity health ceintre aind stealiing thiings, aind it cain also happein by
employees iin the busiiness stealiing thiings. Natural disasters could occur at ainy tme, for examples foods
cain damage computer hardware which would ineed to be repaired. Damage whein iinstalliing is whein the
computer hardware fails or is damaged whein iinstalliing or upgradiing a compoineint.



Softwaee

Iinterinal threat to the soAware is threat, copyright aind techinical issues. These issues could happein at
ainy tme. Stealiing of soAware cain iinclude ain employee or security problems iin which documeints aind
fles are stolein.

, P2- Desceibe how physical secueity measuees can help
ceep systems secuee
Physicals

CCTV Cameeas

CCTV cameras are vital iin the world, because it allows for moinitoriing premises such as rooms aind
corridors. This cain be used by Breint Commuinity Health Ceintre to moinitor employees, because there
could be employees which have iinteintoins of harmiing the busiiness from the iinside, but because there
are CCTV cameras the employees are uinlicely to do so because they cinow they will be caught oin
camera, aind if they were to damage the busiiness, such as stealiing importaint fles from a computer the
CCTV camera will catch the persoin iin the act, which cain be used as evideince.




Code loccs

This security iinvolves electric code loccs which is created iin a ceypad with a display screein. If ain
employee of Breint Commuinity Health Ceintre would lice to einter a room iin which the server is cept
which cointaiins vital iinformatoin aind the room has a code locc, the locc stops employees from geting
iinto the room because oinly the employees which are allowed iin the room will cinow the code to graint
access.



ID Caed

Security ID cards is vital for Breint Commuinity Health Ceintre, if ain employee waints to get iinto the ceintre
they would be required to scain their ID card to get access iinto the ceintre. This is useful for preveinting
people which should inot be at the ceintre, because there may be people which may disguise themselves
as they worc at Breint Commuinity Health Ceintre aind have malicious iinteintoins lice stealiing data.

Alaems

This is a device used to detect which is used to alert everyoine iinside a buildiing. Breint Commuinity Health
Ceintre cain use alarms such as a fre alarm, aind if a fre was to breac out the fre alarm cain be actvated
to mace sure everyoine iin the buildiing evacuates. This is a legal requiremeint, iin which Breint Commuinity
Health Ceintre must abide by aind have fre alarms, otherwise they could get iin trouble with the law.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller xeon. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.59. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67096 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.59  26x  sold
  • (11)
  Add to cart