100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Unit 7 IT systems security and Encryption - Distinction. £58.79
Add to cart

Other

Unit 7 IT systems security and Encryption - Distinction.

 343 views  4 purchases

Understand the current IT security threats, information security and the legal requirements affecting the security IT systems.

Preview 3 out of 26  pages

  • October 13, 2022
  • 26
  • 2021/2022
  • Other
  • Unknown
All documents for this subject (38)
avatar-seller
elizabethzshakesheff
Unit 7 IT Systems Security and Encryption
Assignment 1 - IT security threats and cryptography
Scenario

You work for a start-up company who are developing internet based financial transfer
software which allows people to transfer money quickly and cheaply to friends and
family both at home and abroad.

The director of the company is well aware that such a system would be the
target for cyber criminals and has read in news reports that the Office for
National Statistics reported that there were 2.5 million cyber crime offences in
2015.

He is also aware that you recently completed a BTEC course which included a
unit in IT security so he has asked you to investigate and report on current
security threats to their web site and software.

He has also asked you to investigate encryption methods and how these could
be used to keep their web site and software secure.



Learning Outcomes


A: Understand current IT security threats, information security and the legal
requirements affecting the security of IT systems




Assignment Tasks

Write a report in which you:
Task 1  explain the current IT security threats to which organisations are
exposed
 explain the principles of information security that organisations must
be aware of and the reasons why legal requirements must be
adhered to when considering IT security
 assess the impact that IT security threats could have on an
organisations’ IT systems and their business
 evaluate the effectiveness of the techniques used by organisations
to protect their computer systems from security threats. Your
evaluation should take into account the principles of information
security and the relevant legal requirements.



Task 2 Write a report in which you:
 explain the principles behind cryptography
 explain the ways in which cryptography can be used to secure and
protect the financial data that the company will need to store and
transfer over the internet
 analyse the impact that cryptography will have on the security and

, protection of data that the company needs to store and transfer.



Reading List:
● BBC News Technology section – technology news, including cases of significant
cyber-attacks: www.bbc.co.uk/news/technology

● McAfee’s security advice centre – provides useful and up-to-date information on
security, virus attacks and viruses, written in a reasonably accessible manner:
home.mcafee.com/advicecenter/

● Microsoft's security advice centre – features a regularly updated blog and FAQ on
security issues: www.microsoft.com/security/

● Norton’s security centre – provides articles on security, spam email, software
piracy, etc.: uk.norton.com/security-center/




Assessment Evidence:


A report, either written or electronic, such as a blog



Criteria:

To achieve a Pass grade the To achieve a Merit grade To achieve a Distinction
evidence must show that the evidence must show grade the evidence must
the learner is able to: that, in addition to the show that, in addition to
Pass criteria, the learner is the Merit criteria, the
able to: learner is able to:
7/A.P1 7/A.M1 7/AB.D1
Explain the different Assess the impact that IT Evaluate the effectiveness
security threats that can security threats can have of the techniques used to
affect the IT systems of on organisations’ IT protect organisations from
organisations. systems and business security threats whilst
whilst taking account of taking account of the
the principles of principles of information
information security and security and legal
legal requirements. requirements.

7/A.P2 7/B.M2
Explain the principles of Analyse how the principles
information security when and uses of cryptography
protecting the IT systems of impact on the security and
organisations. protection of data.

7/A.P3
Explain why organisations
must adhere to legal

, requirements when
considering IT system
security.

7/B.P4
Explain the principles and
uses of cryptography to
secure and protect data.



Assessment feedback is available on Moodle.


Assessment Results
Grading Criteria Achieved? (Y/N)
(P1) - Explain the different security threats that can affect
the IT systems of organisations.
(P2) - Explain the principles of information security when
protecting the IT systems of organisations.
(P3) - Explain why organisations must adhere to legal
requirements when considering IT system security.
(P4) Explain the principles and uses of cryptography to
secure and protect data.
(M1) - Assess the impact that IT security threats can have on
organisations’ IT systems and business whilst taking account
of the principles of information security and legal
requirements.

(M2) Analyse how the principles and uses of cryptography
impact on the security and protection of data.
(D1) - Evaluate the effectiveness of the techniques used to
protect organisations from security threats whilst taking
account of the principles of information security and legal
requirements.


Assignment task reference Evidence submitted
P1 Explained the different security threats
that can affect the IT systems of
organisations.
P2 Explained the principles of information
security when protecting the IT systems
of organisations.
P3 Explained why organisations must
adhere to legal requirements when
considering IT system security.
P4 Explained the principles and uses of
cryptography to secure and protect
data.
M1 Assessed the impact that IT security
threats can have on organisations’ IT
systems and business whilst taking

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller elizabethzshakesheff. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for £58.79. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

50064 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy revision notes and other study material for 14 years now

Start selling
£58.79  4x  sold
  • (0)
Add to cart
Added