General Suggested improvements Essay
General Suggested improvements
The improvements I suggest would include having utilities like File Wipe and data encryption, Firewalls and other Malware protection. You should employ tactics such as Health and Safety messages, such as only water may be near the computers, and then it should be in a secure bottle and such things as data awareness, e. g. , people knowing what they should and should not delete and where data is held and why they should have passwords and why there should be “strong” passwords.
There should be efficient junk-mail filters on your email to avoid any viruses coming into your system by email. Task 2: Types of threats to your physical security with suggested improvements(P2) Biometrics These are mechanical security measures that detect fingerprints, gait recognition and iris detection, etc. Be aware that these methods are not foolproof! There are people out there who spend every day trying to beat these systems. Physical security These are security measures like locks and bolts on doors and windows.
Security guards and dogs could be employed, and burglar alarms such as motion sensors, noise detection and other sorts of alarms; CCTV cameras and Smart cameras to be deployed inside and outside the building. The doors to the server should be locked and a security guard should be positioned outside the door. With the server’s hardrives being locked in place and for higher security measures, having a vault door in front of the server, and having the access keys 12 metres apart, and operated simultaneously by two separate employees, would ensure greater (but not foolproof) security.
You could invest in a disaster resistant room with fire resistant tiles, and some way of filtering flood or excess water, and some way of cooling things down if the air conditioning breaks down to avoid the server being flooded and/or cooked, for your server to resist things like terrorist attacks, e. g. , bombs and/or the unlikely but still possible event of a tornado. All these physical security systems could help to make your business secure. Describe how software and network security measures can help keep systems and data secure. (P3, M1) Software and Network Security
The first suggestion I would make would be buy or download your software from reputable retailers. Unlicensed and cracked software could also have incorporated Malware in the cracking code and also, you could be in trouble with the law if you use unlicensed software. You should have the relevant security software up to date and make sure your anti-Malware protection is not actually Malware pretending to be anti-Malware to fool you.
Firewalls Firewalls are metaphorically a wall between you and the Internet which denies access to anything you haven’t specified (i. e. , hackers and malicious websites or material). Every computer has a unique identification address, made up of a series of numbers, and also given a domain name corresponding to those numbers, for easier access, e. g. , howstuffworks. com is also known as 216. 27. 61. 137 . A firewall can block all access to a specific IP address. Firewalls can also filter messages and monitor attempted break-ins. Firewalls can also be implemented in certain machines to allow only one protocol, e. g. , http or tcp and block all others. Encryption
Encryption is a process turning regular text, pictures and other data into illegible text and pictures and data through a series of simple or complicated algorithms depending on your security needs. The text will turn out like this:- 5ugre54jyt656f5t8uf which , for anybody who can speak double Dutch, means absolutely nothing. Encryption is important for sensitive personal information or any business related information which would make it harder for the hackers to uphold your information in any legible way. In encryption techniques, there are two types of keys, Public and Private.
The Public Key is a key that can be passed around and made public. This is to encrypt any information. Once a person has encrypted the information, it cannot be decrypted without the Private Key which is a password, not necessarily a word in the English sense, it can be any combination of letters and numbers, which is more advisable. For greater security, the password should be separate from any digital medium but some software allows you to store it on your computer for automatic decryption. Anti-Virus Software.
Anti-virus software protects against viruses. They have a database of the general layout of viruses so they can recognise any future viruses and also any existing ones. This is a critical piece of software, particularly if your computer has a virus, as this can cause it to slow down or not work altogether, so it is highly advisable to have some sort of anti-virus software installed. Staff Training. It is important to provide regulations or Code of Conduct in your Company, e. g. , you could specify that employees may only use their email for work purposes.
Staff should be aware that it is insecure to leave a computer logged on when they are not around and also not to leave their laptops in cars or on public transport. Laptops should not be left in cars overnight in cold conditions as this could disable them. Computers should not be left in any condition where they could overheat and destroy the contents inside. Staff should also be aware that viruses and other Malware can be sent via email attachments so they must not open any email attachments unless you specifically know what that attachment contains. Staff should also be trained in data management.
This is keeping your files in a structured and organised fashion, having sensible file names and folder names, knowing what should and should not be deleted, knowing how to achieve deleted items, and knowing what to do when other office programmes crash and knowing where you can get the autosave files from. The final training staff need to know is about copyright, registered trademarks and patent Laws and also plagiarism. Biometrics. Biometrics is fusing biology with IT in the fact that fingerprints can be used to access computers or other physical areas.
Known biometrics are:- gait recognition, fingerprint scanning, iris detection, speech recognition. The costs of these security measures can be quite expensive, especially the newer ones like gait recognition and iris detection. More conventional biometrics are relatively cheap like fingerprinting and speech which are probably the most common ones around. Passwords. Passwords are crucial to deter any opportunistic data thieves. If everybody has a strong password, these types of thieves will be stopped.
When signing up for a Google mail account, they have an indicator next to the password, they have a scale next to the password selected, to indicate whether this is a weak to strong password. Generally, weak passwords are 1 – 6, your dog’s name, your wife’s names, or any similar name, important dates like your birthday. These are considered weak passwords as they can easily be guessed. Strong passwords are usually an alphanumeric combination of upper and lower case letters, for instance, GIRfufr57fjy, keep systems and data secure.
Call Back Call back is the CPU putting a process on hold, to go back to it later. Handshaking Handshaking is the computer and a another computer deciding on the protocol. Use of Backups The use of Backups are essential to your business, so that if your hard drive fails you will need to get a new hard drive and if you neglected to back up your computer, all your data is lost. So backups are essential to keep data secure.
Audit logs Audit logs are programmes to log any changes to your computer, eg when you log in, the audit logs check the logs for your username against your password and do you have authorisation to access to continue if so more checking, keeping systems secure. Firewall Firewalls are metaphorically a wall between you and the Internet which denies access to anything you haven’t specified (i. e. , hackers and malicious websites or material). Every computer has a unique identification address, made up of a series of numbers, and also given a domain name corresponding to those numbers, for easier access, e. g. , howstuffworks. com is also known as 216. 27. 61. 137 .
A firewall can block all access to a specific IP address. Firewalls can also filter messages and monitor attempted break-ins. Firewalls can also be implemented in certain machines to allow only one protocol, e. g. , http or tcp and block all others, keeping systems and data secure. Configuration You need to configure your computer and/or network security to your security policies. If you configure your security properly it will prevent unauthorised access onto your network or accidental deletion of data. The configuration is important to keep your system running smoothly and your work safe.
University/College: University of California
Type of paper: Thesis/Dissertation Chapter
Date: 6 July 2017
Let us write you a custom essay sample on General Suggested improvements
for only $16.38 $13.9/page