Saturday, June 8, 2019
General Suggested improvements Essay Example for Free
General Suggested improvements EssayThe improvements I suggest would include having utilities like File Wipe and data encryption, Firewalls and other Malw ar protection. You should employ tactics such(prenominal) as Health and Safety messages, such as only water may be near the electronic computers, and then it should be in a hard bottle and such things as data awareness, e. g. , people knowing what they should and should not delete and where data is held and why they should birth pass newsworthinesss and why there should be vigorous passwords. There should be efficient junk-mail filters on your email to avoid any vir practice sessions coming into your system by email. Task 2 Types of threats to your somatogenetic security measure with suggested improvements(P2) biometry These are mechanical security measures that detect fingerprints, gait recognition and iris detection, etc. Be aware that these methods are not foolproof There are people out there who spend every day tryin g to beat these systems. Physical security These are security measures like locks and bolts on doors and windows. security department guards and dogs could be employed, and burglar alarms such as motion sensors, noise detection and other sorts of alarms CCTV cameras and Smart cameras to be deployed inside and outside the building. The doors to the emcee should be locked and a security guard should be positioned outside the door. With the servers hardrives being locked in place and for higher security measures, having a vault door in front of the server, and having the annoy keys 12 metres apart, and operated simultaneously by two separate employees, would ensure greater (but not foolproof) security.You could invest in a disaster resistant room with go up resistant tiles, and some way of filtering flood or excess water, and some way of cooling things stack if the air conditioning breaks down to avoid the server being flooded and/or cooked, for your server to resist things like te rrorist attacks, e. g. , bombs and/or the unlikely but still possible event of a tornado. All these physical security systems could help to make your business secure. Describe how software and network security measures can help keep systems and data secure. (P3, M1) Software and Network gageThe first suggestion I would make would be buy or download your software from reputable retailers. Unlicensed and cracked software could also have incorporated Malware in the cracking code and also, you could be in trouble with the law if you use unlicensed software. You should have the relevant security software up to date and make sure your anti-Malware protection is not actually Malware pretending to be anti-Malware to fool you.Firewalls Firewalls are metaphorically a wall between you and the net profit which denies access to anything you havent specified (i. e. , hackers and malicious websites or material). Every computer has a unique identification address, made up of a series of numbers, and also disposed a domain name corresponding to those numbers, for easier access, e. g. , howstuffworks. com is also known as 216. 27. 61. 137 . A firewall can block all access to a specific IP address. Firewalls can also filter messages and monitor attempted break-ins. Firewalls can also be implemented in certain machines to allow only one protocol, e. g. , http or tcp and block all others. EncryptionEncryption is a process turning regular text, pictures and other data into illegible text and pictures and data through a series of simple or complicated algorithms depending on your security needs. The text will turn out like this- 5ugre54jyt656f5t8uf which , for anybody who can speak repeat Dutch, means absolutely nothing. Encryption is important for sensitive personal selective information or any business related information which would make it harder for the hackers to uphold your information in any legible way. In encryption techniques, there are two types of keys, Public and Private.The Public Key is a key that can be passed around and made public. This is to encrypt any information. Once a person has encrypted the information, it cannot be decrypted without the Private Key which is a password, not necessarily a word in the English sense, it can be any combination of letters and numbers, which is more advisable. For greater security, the password should be separate from any digital ordinary but some software allows you to store it on your computer for automatic decryption. Anti-Virus Software.Anti-virus software protects against viruses. They have a database of the general layout of viruses so they can recognise any future viruses and also any existing ones. This is a critical piece of software, particularly if your computer has a virus, as this can cause it to slow down or not work alto lounge aroundher, so it is highly advisable to have some sort of anti-virus software installed. stave Training. It is important to provide regulations or work out of Conduct in your Company, e. g. , you could specify that employees may only use their email for work purposes.Staff should be aware that it is insecure to leave a computer logged on when they are not around and also not to leave their laptops in cars or on public transport. Laptops should not be left in cars overnight in cold conditions as this could disable them. Computers should not be left in any condition where they could overheat and destroy the contents inside. Staff should also be aware that viruses and other Malware can be sent via email attachments so they must not open any email attachments unless you specifically know what that attachment contains. Staff should also be trained in data management.This is keeping your shoots in a structured and organised fashion, having sensible file names and folder names, knowing what should and should not be deleted, knowing how to achieve deleted items, and knowing what to do when other office programmes crash and knowing where you can get the autosave files from. The final training staff need to know is about copyright, registered trademarks and patent Laws and also plagiarism. Biometrics. Biometrics is fusing biology with IT in the fact that fingerprints can be employ to access computers or other physical areas.Known biometrics are- gait recognition, fingerprint scanning, iris detection, barbarism recognition. The costs of these security measures can be quite expensive, especially the newer ones like gait recognition and iris detection. More conventional biometrics are relatively cheap like fingerprinting and speech which are probably the most common ones around. Passwords. Passwords are crucial to deter any opportunistic data thieves. If everybody has a bullnecked password, these types of thieves will be stopped.When signing up for a Google mail account, they have an indicator next to the password, they have a scale next to the password selected, to indicate whether this is a weak to strong password. Gener ally, weak passwords are 1 6, your dogs name, your wifes names, or any similar name, important dates like your birthday. These are considered weak passwords as they can easily be guessed. knock-down(prenominal) passwords are usually an alphanumeric combination of upper and lower case letters, for instance, GIRfufr57fjy, keep systems and data secure.Call Back Call back is the CPU pose a process on hold, to go back to it later. Handshaking Handshaking is the computer and a another computer deciding on the protocol. Use of Backups The use of Backups are essential to your business, so that if your hard drive fails you will need to get a new hard drive and if you neglected to back up your computer, all your data is lost. So backups are essential to keep data secure.Audit logs Audit logs are programmes to log any changes to your computer, eg when you log in, the audit logs stay the logs for your username against your password and do you have authorisation to access to continue if so m ore checking, keeping systems secure. Firewall Firewalls are metaphorically a wall between you and the net which denies access to anything you havent specified (i. e. , hackers and malicious websites or material). Every computer has a unique identification address, made up of a series of numbers, and also inclined a domain name corresponding to those numbers, for easier access, e. g. , howstuffworks. com is also known as 216. 27. 61. 137 .A firewall can block all access to a specific IP address. Firewalls can also filter messages and monitor attempted break-ins. Firewalls can also be implemented in certain machines to allow only one protocol, e. g. , http or tcp and block all others, keeping systems and data secure. Configuration You need to configure your computer and/or network security to your security policies. If you configure your security properly it will prevent unauthorised access onto your network or accidental deletion of data. The configuration is important to keep you r system running swimmingly and your work safe.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.