Case study samples, admission essay examples, book reviews, paper writing tips, college essays, research proposal samples
Saturday, March 9, 2019
Importance of Data Security and Data Safety Essay
To prevent companies from utilise or get toing on confidential study to other companies without the permission of the some mavin who the info is nearly, companies leave need to protect the selective information. With the emergeularity of the Internet there be opportunities for thieves to steal their personal entropy. So the government set a impartiality ( data protection act) which is employ to protect peoples rights concerning how data is wontd and you withal pick up the right to see such information and have whatever errors corrected. Also composition exit want to pile through data confidential beca make use of it will non want its competitors to know how the business is going. reheel the 8 principles of the Data Protection feignThe Data Protection Act says the personal data should1. Be adequate, relevant and non excessive. For event college should keep students details and details must be just what is needed and nobody more.2. Be processed in accordance wi th the data subject right. For workout the person that the data refers to have the right to read the information close to him/her and the administration should provide hem/her with information they need.3. Be accurate and be unbroken up to date. There is a duty to keep it up to date, for example to change an address when people move.4. non be kept longer than necessary. For example it is alright to keep information for certain length of time besides it would be wrong to keep information almost past customers longer than a few years at close to5. Be obtained and processed for trammel goals. For example the organization must use the data only in the dash it is described and it must not use it for any other purpose.6. Be secure. This includes keeping the information O.K. up and away from any unauthorised access. It would be wrong to permit personal data open to be viewed by just anyone.7. Not be transferred to countries outside Europe without adequate protection. Unless t he country that the data is beingness sent to has a suitable data protection law8. Be processed fairly and lawfully. For example if you put your money at brim no one can transfer your money without your permission.(a) What is the difference betwixt the Internet, Intranet and Extranet? (P8)Internet Are public networks that allow the user to use any of its facilities.Intranet and Extranet is like a undercover cyberspace. It is like a meshsite that is only get-at-able to the members of a business or partnership. The different between Intranets and Extranet isIntranet Allow the members of transcription to access the access the carcass with an transcription.Extranet Allow the members of brass section to access the constitution from different location but only by the users who have been accustomed access rights.(b)* What is a browser?Is programme that can read network pages, by d acceptloading HTML code and that allows the browser to interpret the code to the sack page. A br owser displays web pages, keeps track of where youve been, and remembers the places you want to return to, the just astir(predicate) used browsers are Internet Explorer and Netscape Navigator.* Describe the role of a browser when using the Internet, Intranet and ExtranetBrowser allows the people to access information, view images, project music and watch video, in the term of intranet and extranet the browser allows user to administer documents, access databases and allow group work.* Describe the role of email when using internet communications.You can transport email to an individual or to a group of people at the same time, you can create poster list so that you can write a message and send it automatically to number of people. Also you can send files such as pictures, word document and sound as attachments to your message.(a) List major threats to an organisation that could happen while using the Internet. (P9)1. Hacking (use to steal the personal details and private file s of gild)2. The spreading of viruses (use to destroy or damage the important files of attach to)3. Internet contrivance (taking credit vizor details from customers)4. Spay ware (is biggest threat in the figurer system which allows someone to log into your computer and use it for their own purpose)5. Spam ( sending unwanted messages especially commercial advertising)Purpose of identificationIn this assignment, I have to do enquiry and get information on the importance of data warrantor measure and data safety. M research must be from ICT sources and non ICT sources and by using the evidence that I pull I should explain the importance of keeping customer information confidential, the master(prenominal) provision of data protection act, the role of browsers and email in internet communications, the difference between internet, intranet and extranet, the major threats to organization from internet and finally a poster that explains the importance of data safety and data securi ty. The assignment will also gather key skills portfolio evidence.M5Physical Security Use of security guards, locks, reinforced doors, windows and walls depending on what is being protected. Use of ICT to enforce security admission on doors, and protected areas of buildings i.e. swipe cards, fingerprint ID, voice recognition.Firewall This is a security device, which acts as a single entry/exit point for information and access to a computer system. All traffic must pass through the firewall and therefore a system is secure from external threats. A firewall usually sits between the internal network of an organisation and access by the internet.Virus Protection It is usual for systems to have some form of anti-virus package installed and running in the background. All files and devices introduced to the system would be scanned, any attempts to diverge system files would be blocked, and notification made to the user/system administrator. Preventing the use of lax disks is a good me thod of eliminating one source of dominance virus problems.Identification of Users A system of user IDs and passwords is a simple method of preventing unauthorised personnel accessing the system. These should be managed by the system administrator. With this, only some users will have access to certain programmes and data therefore increasing the level of security on sensitive data. In addition, some users may only be able to read the data and not write the data. Other users may not have the big businessman to blue-pencil or even to access certain files.Encryption software system the data may be encrypted (coded) into a form, which can only accordingly be decoded by the intended user. If the data falls into the wrong hands, it will be meaningless.Backups To guard against the loss of data, backups should be regularly made. These backups should be stored in a separate place, preferably in a fireproof environment.Passwords software Password protection usually involves a person typ ing in* A User Name to come out the person.* A Password to identify the person. He should be the only one to know what it is.Computer viruses which are programs that destroy the way computer operates without the knowledge of the user, there are grand numbers of viruses some are extremely malicious with the ability to delete or damage files and programs.Some of the threats that they cause to computer systems include* Deleting data on the hard disk of the organisation computer system.* Enabling hackers to pirate the organisation system and use it for their own purposes.How do viruses spread* CDs and floppy disks aiming infected documents.* Emails containing infected attachments.Hackers who gain unauthorised access to computer systems for the purpose of stealing and corrupting data, also gaining access to financial information about the organisation business or their customers for the purposes of fraud.Security measures may include* severally user should be given a user name and a password.* Computer usage may be logged.* Computers should be disconnected from a network when not in use.* Use a firewall a computer running software, which detects hackers dialling in to a network.Spam authorised users downloading a web page or receiving an email with hidden active content that attacks the organisation system or send sensitive information to unauthorised people. ecesis can stop spreading of junk e-mail by using spam filtering softwareSpy ware is software that is placed on organisation computer when the employee visits certain websites, it is used to secretly gather information about the organisation usage and sends it back to advertiser or other fire confederacy to tracking the organisation system use .it can also slow down or crashes the organisation computerPop up Many fraternity advertisers on the Internet by using windows that pop up in the middle of computer screen to display a message. They might also open when you click a link or button on a Web site , and they might open all over or under the window, you wish to view. Some pop-up windows can contain inappropriate content or can be a way for employee of organisation to accidentally download dangerous software (called spyware or adware) onto organisation computer.Infringement of procure Internet users are not allowed to copy or print some internet materials such as video, music, files and photos without the permission of copyright holder and sometimes they may have to pay a attest to do so.Theft and fraud credits card fraud for example people can steal the details on credits card and using them illegally to buy goodsSole principalA bushel trader is the actual owner of a business, a sole trader also has unlimited obligation. All the debts of the business are the debts of the owner.They can not issues appoints .The whole meaning behind Sole means that she/he does not have partners. (e.g. electrical repair, picture framing, photography, diving instruction, retail shops, and hotels)PartnershipA Partnership can be liable for all debts, it is easy to setup, but is also inexpensive to form. Forming partnership requires an agreement that is some times called partnership agreement between two to twenty individuals which entitles them to jointly own and carry on a trader business together. A partnership is a contract between two or more persons who agree to kitty talent and money and share net profit or loss.Private limited callerA Private limited company has limited liability (the shareholders cannot loose more than their original shareholdings), and a minimum of two shareholders and a maximum of fifty shareholders. It cannot say its shares to the public. A private limited company is treated as a legal entity.Public limited companyA company which may have an unlimited number of shareholders and offer its shares to the wider public. (e.g. Cadbury and Tesco)Multi-National companyA company that does business in more than one country, usually by setting up b ranch offices.Tesco Characteristics* Type of company Tesco is an international retailer and is a publicly owned company (Public control Company Plc).* Products including food and non-food business, personal finance, internet shopping, electrical items, home entertainment, toys, sports equipment, and many another(prenominal) more.* Profit / lossTescos Profit and Loss20052004Sales at net selling prices37,07033,557 dollar volume including share of joint ventures34,35331,050Less share of joint ventures turnover(379)(236)Operating profit/(loss)1,9491,735Share of operating profit/(loss) of joint ventures and associates13097Net profit/(loss) on organization of fixed assets53(9)Profit on ordinary activities before tax income1,9621,600Underlying profit before net profit/(loss) on establishment of fixed assets, integration costs and goodwill amortisation2,0291,708* Size of company Tesco operates 923 stores and employs 240,000 people , there are 639 branches in Great Britain and 182 in the respire of Europe* Location they operate in UK, Hungary, Poland, Czech Republic, Slovak Republic, Thailand, South Korea, chinaware and the Republic of Ireland* Purpose of company to create value for customers to earn their spirit loyalty.* Aims Built good non-food sales expanded into retailing services and work e-commerce successfully.* Objective1. To deliver a consistently strong customer offer.2. making their shopping trip as easy as possible.3. Constantly pursuance to reduce their prices to help customer spend less.* LogoCadbury Characteristics* Type of company is an international retailer and is a publicly owned company (Public curb Company Plc).* Products chocolate and drinks brands.* Profit / lossCadbury Profit and Loss (Millions)2006 (Millions)2005Turnover6,508.006,085.00Operating Profit / (Loss)1,003.00825.00Net Interest(188.00)(205.00)Pretax Profit843.00642.00Post measure Profits703.00497.00Total Dividend Paidn/an/aRetained Profit / (Loss) for the financial yearn/an /a* Size of company they operate in more than 35 countries and they employs over 55,000 people* Location Americas, Europe, Middle East and Africa and Asia Pacific.* Purpose of company the organization work together to create brands people love.* Aims 1. Deliver stockholder performance.2. Ensure their capabilities are outdo in class.3. Reinforce reputation with employees and association* objective1. Responding to consumer needs quickly.2. Grow shareowner value.3. Attract and develop the best kind of people.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment