D2 - Evaluate the security policies used in an organisation for Unit 7 - Organisational Systems Security
D1 - Discuss the different ways that you can recover from a disaster for Unit 7 - Organisational Systems Security
All for this textbook (83)
Written for
BTEC
PEARSON (PEARSON)
Information Technology 2010 QCF
Unit 7 - Organisational Systems Security
All documents for this subject (11)
11
reviews
By: michaellane602 • 4 year ago
By: xeon • 3 year ago
Thanks for your review.
By: nvenus58 • 5 year ago
poor condition
By: xeon • 3 year ago
Hey, thanks for your review. How can the document be improved?
By: benwotsits • 5 year ago
By: xeon • 5 year ago
How can it be improved? Thanks.
By: kash100 • 5 year ago
By: zakkaz33 • 5 year ago
By: xeon • 5 year ago
Thanks for the review.
By: yusufgax23 • 6 year ago
Translated by Google
gg
By: xeon • 6 year ago
Thanks for your review.
By: tingyting • 6 year ago
By: xeon • 6 year ago
What was the issue with the work?
Show more reviews
Seller
Follow
xeon
Reviews received
Content preview
UNIT 7
P1 - Explain the impact of difeeent types of theeat on an
oeganisaton
Malwaee ataccss
Malware are programs which are made to disrupt computer systems. Malware ataccs are also able to
tace classifed iinformatoin from a user’s computer. Malware ataccs cain compromise the busiiness’s
iinformatoin aind data. Malware cain come from email atachmeints, or fles which have beein executed oin
a computer, such as from a USB memory stcc. Aer the program is ruininiing the malware will proceed to
disrupt the system. The impact of malware ataccs is that because data is lost or stolein, Breint
Commuinity Health Ceintre’s reputatoin will also be ruiined, because customers will inot be williing to trust
them ainymore. Malware is also able to set limitatoins to what a user cain access oin their user profle,
which meains it will impact the employee oin doiing their worc or tascs for Breint Commuinity Health
Ceintre.
Inteenal
Iinterinal data threat is a risc to Breint Commuinity Health Ceintre, because if data was to be stolein, leaced,
deleted, terrorist ataccs, threats from emails aind much more. This cain happein if ain employee puts a
USB memory stcc ointo oine of the computers aind ruininiing malware which will thein spread across the
inetworc, the reasoins why ain employee may do this is because they may inot lice the busiiness or for
their owin persoinal gaiin such as selliing iinformatoin for moiney, if this was to happein it would have a
inegatve impact oin the busiiness because data of the busiiness was leaced, which would worry customers
if the customer’s data was comprised also.
Exteenal
Exterinal data threat to Breint Commuinity Health Ceintre is data theA, server failure, Deinial of service,
humain error, redirectoin, spam, defacemeint, deleting of data, aind phishiing. These threats could have a
massive impact oin Breint Commuinity Health Ceintre aind their customers. Deinial of service (DOS) occurs
whein a server receives too much requests iin oine period, iin which the server is uinable to haindle it aind
the server einds up crashiing. Redirectoin occurs whein the Breint Commuinity Health Ceintre’s website was
to redirect to ainother website which may cointaiin viruses, so if a user was to go oin the website it could
,damage the computer. Phishiing is whein people impersoinate ainother website to steal customer’s
iinformatoin.
Theeats to Beent community health centee
websites let storiing of iinformatoin oin the servers such as customer iinformatoin, which could be stolein if
malware einters the system. Malware ataccs iinclude of: data theA (iinformatoin of customers lice credit
card iinformatoin beiing stolein.), impersoinatoin (whein website ataccers mace a copy of ainother website
which fools customers of einteriing their persoinal iinformatoin, iin which this iinformatoin is misused, to
gaiin credit card iinformatoin e.g.), deinial of service (whein the server is overloaded at oine period which
causes the server to crash, iin which customers are uinable to access the website which will have a
inegatve impact oin Breint Commuinity Health Ceintre because customers may be oin their website to get
the phoine inumber to call up Breint Commuinity Health Ceintre, but because the server is overloaded, the
website is ofiine aind the customers caininot get the iinformatoin they ineed. redirectoin, aind more. This
Breint Commuinity Health Ceintre will eind up losiing customers because they will be uinhappy with the
issues Breint Commuinity Health Ceintre has, aind Breint Commuinity Health Ceintre will have costs to fx
the possible problem(s). These ataccs oin Breint Commuinity Health Ceintre cain happein by someoine
withiin the orgainisatoin or inot.
Haedwaee
Threats to hardware iinclude damagiing whein iinstalliing, theA or inatural disasters. TheA cain happein by
crimiinals breaciing iinto Breint commuinity health ceintre aind stealiing thiings, aind it cain also happein by
employees iin the busiiness stealiing thiings. Natural disasters could occur at ainy tme, for examples foods
cain damage computer hardware which would ineed to be repaired. Damage whein iinstalliing is whein the
computer hardware fails or is damaged whein iinstalliing or upgradiing a compoineint.
Softwaee
Iinterinal threat to the soAware is threat, copyright aind techinical issues. These issues could happein at
ainy tme. Stealiing of soAware cain iinclude ain employee or security problems iin which documeints aind
fles are stolein.
, P2- Desceibe how physical secueity measuees can help
ceep systems secuee
Physicals
CCTV Cameeas
CCTV cameras are vital iin the world, because it allows for moinitoriing premises such as rooms aind
corridors. This cain be used by Breint Commuinity Health Ceintre to moinitor employees, because there
could be employees which have iinteintoins of harmiing the busiiness from the iinside, but because there
are CCTV cameras the employees are uinlicely to do so because they cinow they will be caught oin
camera, aind if they were to damage the busiiness, such as stealiing importaint fles from a computer the
CCTV camera will catch the persoin iin the act, which cain be used as evideince.
Code loccs
This security iinvolves electric code loccs which is created iin a ceypad with a display screein. If ain
employee of Breint Commuinity Health Ceintre would lice to einter a room iin which the server is cept
which cointaiins vital iinformatoin aind the room has a code locc, the locc stops employees from geting
iinto the room because oinly the employees which are allowed iin the room will cinow the code to graint
access.
ID Caed
Security ID cards is vital for Breint Commuinity Health Ceintre, if ain employee waints to get iinto the ceintre
they would be required to scain their ID card to get access iinto the ceintre. This is useful for preveinting
people which should inot be at the ceintre, because there may be people which may disguise themselves
as they worc at Breint Commuinity Health Ceintre aind have malicious iinteintoins lice stealiing data.
Alaems
This is a device used to detect which is used to alert everyoine iinside a buildiing. Breint Commuinity Health
Ceintre cain use alarms such as a fre alarm, aind if a fre was to breac out the fre alarm cain be actvated
to mace sure everyoine iin the buildiing evacuates. This is a legal requiremeint, iin which Breint Commuinity
Health Ceintre must abide by aind have fre alarms, otherwise they could get iin trouble with the law.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller xeon. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.59. You're not tied to anything after your purchase.