Organisational Security

advertisement
BTEC Extended Diploma In ICT
Unit 7: Organisational Systems Security
ASSIGNMENT
Assessment Activity Front Sheet
This front sheet must be completed by the student where appropriate and included with the work
submitted for assessment.
Students Name:
Assessors Name: George Dong
Date Issued:
Deadline:
(Issued to students)
Returned On:
(To be submitted by students)
(Returned by student)
Unit: 7
Organisational Systems Security
P1
P2
P3
P4
P5
P6
M1
M2
M3
D1
D2
In this assessment you will have opportunities to provide evidence against the
following criteria.
Unit
To pass this unit the evidence must show that the student is
Objectives
able to:
(Pass)
Objective 1
Objective 2
Objective 3
Show good knowledge and understanding of Organisational Systems Security
and must meet objectives 1-3 of the assessment criteria attached.
Understand the impact of potential threats to IT Systems.
Know how organisations can keep systems and data secure.
Understand the organisational issues affecting the security of IT Systems
Learner’s comments:
Sign…………………………
Assessor’s general comments:
Internal Verifiers approval to use with students
Comments
IV’s Name
Unit 7 Organisational Systems Security
IV’s Signature
Date
George
Unit Keywords:
malicious damage, counterfeit goods, technical failures, human errors, theft of
equipment, information security, confidentiality, integrity & completeness of data,
access to data, locks, visitor passes, sign in/out system, biometrics, retinal scans,
fingerprint, voice recognition, guards and cable shielding, encryption techniques,
call back, handshaking, diskless networks, use of backups, audit logs, firewall
configuration, virus checking software, use of virtual private network (VPN),
intruder detection systems, passwords, levels of access to data, software
updating, disaster recovery, whole system replacement, tiers of recovery,
disaster recovery policies, updating of security procedures, scheduling of security
audits, codes of conduct, mail usage policy, internet usage policy, software
acquisition, installation policy, surveillance policies, risk management, budget
setting, CMA 1990, CDPA 1988, open source, freeware, shareware and commercial
software, DPA 1984, 1998, 2000, ethical decisions making, freedom of
information
Statement of context
Scenario 1
You work as a Junior Technician for Technology Time, a small IT support
company that provides software and hardware support to a number of small and
medium sized businesses.
The User Support Manager has asked you to prepare documentation, which you
will present to various businesses, which will provide them with help and guidance
on security issues.
How to provide required evidence
The evidence for this unit should be presented in various forms, such as a, written
report, presentation, poster or a booklet. At the start of each task it will state how
you need to present it. I accept recorded presentations that could be played back to
the group.
Task 1 (P1, M1)
Deadline:
Create a PRESENTATION which will
a) Explain the impact of different types of threat on an organisation’s IT systems
and information. You need to include all potential threats (malicious damage,
threats related to e-commerce, counterfeit goods, technical failures, human
errors, theft of equipment).
b) You will also present this to a group and/or the whole class. [P1]
c) You need to discuss information security (confidentiality, integrity &
completeness of data, access to data) in relation to each of the threats and their
impact. [M1]
Unit 7 Organisational Systems Security
George
Task 2 (P2,P3)
Deadline:
Create a Poster which will:
a) Describe how physical security measures can help keep systems secure. You
need to include all of the following measures: locks, visitor passes, sign in/out
system, biometrics (retinal scans, fingerprint, voice recognition, guards and
cable shielding). [P2]
b) Describe how software and network security can keep systems and data
secure. You need to include ALL of the following: encryption techniques, call
back, handshaking, diskless networks, use of backups, audit logs, firewall
configuration, virus checking software, use of virtual private network (VPN),
intruder detection systems, passwords, levels of access to data, software
updating, disaster recovery e.g. backup systems, whole system replacement,
tiers of recovery) [P3]
c) You will also present these to a group and/or the whole class.[P2, P3]
Note: You need to make your poster appealing by being creative, such as the
use of images.
Task 3
(P4, P5)
Deadline:
Create a hand-out (leaflet) which will be given to new members of staff that will
a) Explain the policies and guidelines for managing organisational IT security
issues. You need to cover all of the following: disaster recovery policies,
updating of security procedures, scheduling of security audits, codes of
conduct (e.g. mail usage policy, internet usage policy, software acquisition,
installation policy), surveillance policies, risk management, budget setting. (P4)
b) Explain how employment contracts can affect security. You need to cover the
following: hiring policies, separation of duties, ensuring compliance including
disciplinary procedures, training and communicating with staff as to their
responsibilities. (P5)
c) You will present these to a group and/or the whole class. [P4, P5]
Unit 7 Organisational Systems Security
George
Task 4 (P6, M3)
Deadline:
Create a PowerPoint presentation that
a) Review the laws related to security and privacy of data. You need to
summarise the main principles, implementation and exemptions of the following
laws: CMA 1990, CDPA 1988, the copyrights differences between open source,
freeware, shareware and commercial software, privacy and compensation
requirements of DPA 1984, 1998, 2000 [P6].
b) Explain the role of ethical decisions making in organisational IT security. – you
need to state how to deal with them. The issues to be covered are: freedom of
information versus personal privacy (electoral roll, phone book and street maps
put together), permission to the use of e.g. photographs, videos and CCTV
footage. [M3]
c) You will present these to a group and/or the whole class.[P6]
Task 5 (M2,D1)
Deadline:
Create a report which will
a) Explain the operation and use of an encryption technique in ensuring security
of transmitted information. You need to explain clearly how each type of
encryption works (minimum two different methods) and how useful it is in
securing data. [M2]
b) Discuss different ways of recovering from a disaster. (You will need to
investigate disaster recovery options and discuss how and when they would be
used.[D1]
Task 6 (D2)
Deadline:
Write a report to:
a) Extending on basis of P6 and M3, evaluate the security policies used in an
organisation, focusing on how to strengthen the security of the IT systems.
Must consider the new and upcoming technologies and the threats
accompanying them, such as Bring Your Device.[D2]
Check: www.acm.org; www.bcs.org; www.bsa.org.uk; www.fast.org.uk; www.ico.gov.uk;
Unit 7 Organisational Systems Security
George
Name:
Interim feedback to student:
1
2
3
Declaration by student:
I declare that all the work submitted for assignment is my own work.
Student:
Unit 7 Organisational Systems Security
Date:
George
Criteria
To achieve the criteria the evidence must show
reference that the student is able to:
P1
P2
P3
P4
P5
P6
M1
M2
M3
Tick
if
met
Comment
Page
No.
Explain the impact of different types of
threats on an organisation.
Describe how physical security measures
can help keep systems secure.
Describe how software and network
security can keep systems and data
secure.
Explain the policies and guidelines for
managing organisational IT security issues.
Explain how employment contracts can
affect security.
Review the laws related to security and
privacy of data.
Discuss information security.
Explain the operation and use of an
encryption technique in ensuring security
of transmitted information.
Explain the role of ethical decision making
in organisational IT security.
D1
Discuss different ways of recovering from
a disaster.
D2
Evaluate the security policies used in an
organisation.
Unit 7 Organisational Systems Security
George
Download