100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
Previously searched by you
P1 - Explain the reasons for upgrading IT systems in an organisation & M1 - Examine why an organisation needs to keep pace with IT developments for Unit 7 - Organisation Systems Security£5.89
P1 - Explain the reasons for upgrading IT systems in an organisation & M1 - Examine why an organisation needs to keep pace with IT developments for Unit 7 - Organisation Systems Security
This leaflet explains the reasons for upgrading IT systems in an organisation. It also examines why an organisation needs to keep pace with IT developments.
TECHNICAL FAILURE: INTRODUCTION: P1: EXPLAIN THE
Although computers have become IT systems are changing and
more reliable as time has pro- adapting before our very eyes. IMPACT OF
gressed, the complex nature of
the systems being used mean
While this has proven to be an
exciting time in human history
DIFFERENT TYPES
that technical failure will always as ideas are drawn up for OF THREAT ON AN
be a part of the equation. Having where we could take the tech-
a server shutdown or a storage nology next, it is also a danger- ORGANISATION
device become corrupted can ous time as hackers come up
cause considerable disruption to with new and destructive ideas
an induvial worker and the organ- to negatively impact our IT sys-
isation as a whole. Due to our in- tems. This leaflet will discuss
creased reliance on technology, the potential malicious threats
technical failure can cause exten- to a system and the impacts
sive damage to the security of an that these threats could have
IT system. on their organisations.
THEFT OF EQUIPMENT: COUNTERFEIT GOODS:
Thefts can occur digitally (via The trade and exchange of
hacking) or physically (USB with counterfeit goods has a two-
customers’ data being stolen). If fold impact in terms of its
an organisation’s equipment/data threat level. For one, it puts the
is stolen, the impacts of such an companies whose products are
act can be long-standing; con- being counterfeited (games,
sumer confidence can be lost, es- movies, music etc.) at risk of
pecially if it’s the customer’s data losing their primary source of
that’s been stolen. income. It also puts the recipi- George Mizen
ent who is buying the counter-
HUMAN ERROR: feited goods at risk of breaking BTEC Level 3 ICT, Year 2
This is the most common security the law, which if caught could Unit 7
threat in any IT system. Being result in a heavy fine.
forgetful, ignorant or just having SOURCES:
a lack of knowledge on how to
operate a system correctly can IMAGE = Cyber Threat Title Page
cause security breaches that neg- IMAGE = Counterfeit Goods Sign
atively impact the entire system.
Port Scanning Info
Man In The Middle Info
Magic Disk Tactics Info
Key Logging Info
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller TechLad. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £5.89. You're not tied to anything after your purchase.