• tell the receptionist who they are visiting

•       Physical
security locks are crucial for any IT system. This is because although the
actual data on a computer is somewhat secure it can still breached easily if
someone can have access to the actual hardware. The idea of having a locked
door means that people with authorised access the room.

•       If
someone without authorised access can get in it means that the door would have
to be broken down. This causes someone to hear it happening and creates more
attention meaning that someone would come whether they have authorised access
or not.

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now

•       Visitor
passes are a small chip that is placed inside something, for example a visitor
pass card. It contains a chip inside which can be coded for a specific time
frame or for a specific area. So when a visitor does come in, they can tell the
receptionist who they are visiting – this helps to determine the area they are
allowed in. additionally they can ask who they are visiting and the receptionist
can gauge the length they will be there for.

•       This
is important for security as the people with these specific cards only  have access to the areas and resources they
need. It keeps unauthorised people out. These cards can help to unlock doors
which are secured by a magnetic lock.

•       Visitor
passes are a small chip that is placed inside something, for example a visitor
pass card. It contains a chip inside which can be coded for a specific time
frame or for a specific area. So when a visitor does come in, they can tell the
receptionist who they are visiting – this helps to determine the area they are
allowed in. additionally they can ask who they are visiting and the
receptionist can gauge the length they will be there for.

•       This
is important for security as the people with these specific cards only  have access to the areas and resources they
need. It keeps unauthorised people out. These cards can help to unlock doors
which are secured by a magnetic lock.

•       Retinal
scans can be used for identification purposes they are widely used in airports
to identify people going through the border. This similar system can be adopted
in the workplace.

•       This
is very secure as only the person signing in and out can verify it. Also, if
the company decide to adopt an iris scan instead of a normal retinal scan then
the user can wear their glasses during the scan.

 

•       Fingerprint
scanning is another type of biometric. It allows for the scanning of your
fingerprint for identification. It scans the ridges of your fingerprint and
records it with your details so it can be matched up later.

•       Fingerprints
are a good security measure as they can be used to sign in and out. Also,
fingerprints can now also be used on locks so they can be unlocked with just a
fingerprint only allowing authorised personnel into a room.

•       This
type of biometric, voice recognition is when a device records your voice as you
speak. This recording is then matched to a previous recording to make sure that
the voices are the same. This is hard to replicate however sometimes for less
advanced voice recognition systems a voice recording might do.

•       This
helps to keep your computers in a room secure as the people who have
authorisation can only get in. voice recognition devices can come in the form
of door locks too however this hardware is slowly coming into the market. This
way allows for certain access to only the people who need access.

•       A
security guard is simply someone who stands at the door looking after it and
controlling who is going in and out for what reasons. They are trained humans
who know how to deal with situations fast and who know how to deal with people.

•       This
can help keep a computer network secure as you can hire a guard to stand around
the entrance to the room. This now means that the security guard knows who is
in the room at a given time. They can also ask the person entering for their
identification and allow only authorised people.

•       A
shielded cable is a of one or more insulated conductors. The layers maybe of
copper strands wrapped around. The cable is usually covered by a plastic
jacket, this is for better insulation and protection to skin. The shield which
is played by the strands of copper has the task fo acting as a faraday cage and
reduces noise affecting the signals.

•       This
is important for a business to use as there is less risk of their data
transfers being interrupted due to the noise and electromagnetic radiation. It
means that there can be a smooth transfer of data at quicker speeds and also
means that the transmission is less likely to be affected.

•       The
firewall protects the computer by controlling the network traffic. Firewalls
help to remove and reduce hacker access by protecting you from worms, and
viruses that could be trying to exploit the computer system.

•       The
way in which the firewall protects the computer system is that it controls what
is being downloaded from the internet. This is important as the employees wouldn’t
know what’s actually being downloaded from what they see. the firewall is a
juristic measure which allows for optimum security over a system and network.

•       A
virus is a program that has has been coded to cause harm to your computer. A
virus scanning software simply scans the computer for these harmful programs so
that they can be actioned. Examples of virus checking software would be
programs like AVG and McAfee.

•       This
helps to keep the system secure as viruses that can cause damage and data loss
can be prevented and removed through this software. Also it would mean that the
virus can’t be spread around the system. For example it can be spread through a
server network if it is removed. The virus checking software will also tell you
what type of virus it is.

•       An
intruder detection systems monitors the network and system through the use of a
software/application. It detects any malicious activity and it can reported
directly to an admin. An example of an IDS is an anti-virus software.

•       The
use of an intruder detection system can ensure the safety and security of a
system as it allows for detection of malicious files that intend to do harm. It
means that when someone is aware, for example the admin, they can easily remove
the file reduce and the way in which the file can exploit the system.

•       An
intruder detection systems monitors the network and system through the use of a
software/application. It detects any malicious activity and it can reported
directly to an admin. An example of an IDS is an anti-virus software.

•       The
use of an intruder detection system can ensure the safety and security of a
system as it allows for detection of malicious files that intend to do harm. It
means that when someone is aware, for example the admin, they can easily remove
the file reduce and the way in which the file can exploit the system.

•       This
means that the amount and the capability that someone has on a piece of data.
For example, a piece of data may be read only to the employees but the
management team can edit the document. Also, it means that users can only
access certain information that is relevant to them. The highest level of
access to data that one can have is access to sensitive information. The lowest
level of data access is access to certain files.

•       This
helps to secure data and the computer system as only the people with the
authority are able to access the data. This also means that it is less likely
that important and highly sensitive information will be leaked and exploited.

•       This
means that the amount and the capability that someone has on a piece of data.
For example, a piece of data may be read only to the employees but the
management team can edit the document. Also, it means that users can only
access certain information that is relevant to them. The highest level of
access to data that one can have is access to sensitive information. The lowest
level of data access is access to certain files.

•       This
helps to secure data and the computer system as only the people with the
authority are able to access the data. This also means that it is less likely
that important and highly sensitive information will be leaked and exploited.

•       An
audit log is a record of everything that happens on a network. For example it
can record when a file on a system was opened the time a user logged in and
also the things they changed it could even record the keystroke that the user
used. The whole point of an audit log is that it can record when and what
happened. Audit logs come in a range of forms but the one used for humans is a
ASCII file as it is readable and understandable due to the character type.

•       This
helps to make a system secure as it allows for everything to be tracked and
recorded, also it means that if anything does happen the admin knows what it
was and when it happened. Additionally it means that the admin can see if
something goes wrong and it is easy for them to trace it down.

•       A
diskless network is where the actual computer doesn’t have a hard drive and all
the files are saved externally on a server 
somewhere else. This means that nothing is saved on the computer
directly. This also allows for quick updates as they can be done from the
server as that’s where everything is saved.

•        this helps to make a system secure as it means
that there is only one place for data on the system to be accessed. This also
means that any theft or damage to an individual computer will not have any
effect on the data that is saved.

•       When
a computer wishes to establish a connection with another computer or network
they have to exchange information, this is a protocol. It gives instructions
and rules to connect. When they connect they create a handshake to start data
transfer and connection.

•       This
ensures security on a system as it means that only computers and devices that
are connecting are authorised first. It also means that rules are set out for
what each device connecting can do.  

•       Public and private key are techniques
for encryption of data. It consists of 2 crypto keys. The public key is useable
and accessible to people on a directory. The private key is unique to the
owner. The private key must stay private and confidential for the owner.

•       The keys for both public and private
keys are both mathematically created. When the keys are decrypted by its
matching key. This type of encryption allows for strong privacy and
confidentiality for data it ensures it creates a digital signature for
data. 

•       A
virtual private network allows for you to browse the web anonymously. It works
by creating a private network from a public connection. It masks your IP
address so that it is hidden from the sites.

•       The
reason why a VPN is useful is because it stops people from accessing what you
are browsing. This means people who are connected on the same connection can’t
see what you’re doing. It also means that your web browsing is kept anonymous.

•       Call
back is an encryption technique which allows for the confirmation of someone.
On a computer system dial up systems admins are able to tap into a network and
send a protocol that the computer system will then send back for
authentication. Call back follows the CHAP protocol, which stands for Challenge
Handshake Authentication Protocol.

•       This
is used for security purposes as you  can
authenticate systems on a network using this system, also if there are any
suspicions then you can attend to this straight away as it could be a major
security problem.

•       A
backup system is a arrangement that is meant for the sole purpose of taking
backups. This means that it will save everything in another location creating
another copy.

•       There
are two types of back up systems; these are differential and incremental.

•       A
differential back up system is better as it performs a full back up from the
files on the system.

•       An
incremental back up system only backs up the files that have been recently been
modified or updated.

Pro’s

•       Creates
a copy of the data in a second location.

•       Services
like data centres allow for data to be stored far from a site.

•       Differential
back up systems allow for a better back up as everything is getting back up.

Con’s

•       Big
damage could also damage the backup if the storage location is geographically
nearby.

•       Incremental
back up systems only allows for recently modified data, this doesn’t help as
not all the data is being back up.

•       This
is a recovery that is to be avoided. This is recovery system that you would use
if you weren’t prepared for if you did have a disaster. This recovery type
means that you would replace the computer system physically. Many companies
have a contract with a company who allow them to virtually use their computer
system on a system failure.

•       The
advantage of this is that you will get new computer systems. However the
disadvantage is that you will spend a lot of money coming back from this, as
you need to replace all the systems, also, the data that was originally stored
is either gone completely or is backed up somewhere but is not up to date and
not valid.

•       This
is a recovery that is to be avoided. This is recovery system that you would use
if you weren’t prepared for if you did have a disaster. This recovery type
means that you would replace the computer system physically. Many companies
have a contract with a company who allow them to virtually use their computer
system on a system failure.

•       The
advantage of this is that you will get new computer systems. However the
disadvantage is that you will spend a lot of money coming back from this, as
you need to replace all the systems, also, the data that was originally stored
is either gone completely or is backed up somewhere but is not up to date and
not valid.

•       Tier
0 – this is where the losses all saved information, documentation and all
backups. This could be a long recovery or cant be recovered from at all.

•       Tier
1 – this is where all backups made are moved to a external location, called an
offsite storage facility these backups stored here are secure.

•       Tier
2 – this is when a company decides to make backups regularly, this is both with
their own framework and a external storage facility.

•       Tier
3 – this is where backups are made through electronically vaulted data. Time on
recovery of this tier is about 24 hours.

•       Tier
4 – this is for businesses who need quick recovery from a disaster and begins
to implement more disk based solutions.

•       Tier
5 – this is where data on both before the disaster and the backups are
practically identical, it allows for barely any data loss.

•       Tier
6 – this is for companies who need to recover rapidly, they need their data and
applications installed back onto systems without any data loss.

•       Tier
7 – this is where the recovery process is done automatically and makes it much
faster than the manual procedures like the tiers above.

•       A
disaster recovery policy is the process of how to recover and protect the a
business’ IT framework if in the event of a disaster. Businesses should test
their policy regularly to make sure it is followed and it works.

•       The
advantage of this is so that the people who are recovering the data know what
exactly what they need to do to recover data with little to no data loss.

•       The
disadvantage of this is that the policy can’t be saved digitally as the
computer or network it damaged the policy wont be able to be accessed.

 

Written by