Preview

unit 242

Satisfactory Essays
Open Document
Open Document
658 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
unit 242
Unit 242
Knowledge Questions

1.1 Describe the security issues that may threaten system performance

Security issues that may threaten system performance could be things such as an unwanted/unauthorized email, which may lead to hackers. Then there is also the possibility of viruses, which will slow down the computer and might enable unwanted access in to private accounts and data.

1.2 Apply a range of security precautions to protect IT systems and data

Security such as anti-virus software can be used to protect the computer and data.
It automatically scans the computer for viruses, Trojans, worms, and spyware on a regular basis. It also protects the computer from suspicious files. Internet security can also be altered if needed. When loading up internet explorer, click on tools and open ‘internet options’ on the drop down menu, select security on the tabs and a box like this will appear:
Here you can alter the level of security you want to set for the internet and block websites that you may feel are inappropriate. You need to protect data with a safe password. A password that includes numbers as well as letters will be a lot safer than just a normal word.

1.3 Describe the threats to system and information security and integrity
Threats to the system and information security can be things such as accidentally deleting a file and unauthorised access which may lead to theft of private details. Hackers and viruses also prove a huge threat to a system.

1.4 Keep information secure and manage personal access to information sources securely
To keep information secure on the computer we have an individual username and also have to create a password that is easy to remember but also difficult for anyone to guess. I use a password that includes letters and numbers and this gets changed every month.

1.5 Describe ways to protect hardware, software and data to minimise security risks
Secure passwords are the best way to protect data. A

You May Also Find These Documents Helpful

  • Good Essays

    One way is to use first letter of each word in a sentence and use that acronym as the base of your password.…

    • 691 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Security Audit Policy

    • 1938 Words
    • 8 Pages

    The internet is a ever expanding worldwide network of computers and servers containing millions of pages of information. Users are cautioned that many of these pages include offensive, sexually explicit, and inappropriate material. It is understandable that sometimes it is difficult to avoid contact with said material while using the internet. Often times an innocent web search may lead to web pages with offensive material. Also, the usage of email on the internet may lead to the receipt of unwarranted mail with offensive and/or malicious content.…

    • 1938 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    There are a number of ways of reducing this risk to children and young people. You may need to talk to and explain to them about people who may not be who they say they are and may not have the best intentions. You could use control systems to put passwords on sites and even block sites from coming up. Restrict the amount of time that your child spends on the internet.…

    • 347 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    3. Everyday, Australians are shopping online, socializing with friend’s online and storing information online. Being able to access the world wide web has allowed us to connect around the world, but the more time we spend on it, the more of our personal life gets uploaded and the more easier it is for people to invade our privacy.…

    • 748 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Computers benefit from having all-in-one computer security systems installed for several reasons. The first is it makes the computer run at optimum performance. This means the computer will run faster and more efficiently. If a computer crashes and it has this software installed, the software has a system backup that will protect the information on the computer. The software will also tune up the computer to provide better performance. This software is effective because it keeps the computer safe. This software provides the computer owner with piece of mind. Without the software, anytime a computer is turned on with an internet connection, the computer is vulnerable to viruses, hackers, and other intrusive means of damaging the computer, or obtaining personal information. The all-in-one computer security systems include antivirus, antispyware and antiphishing software. This will block any viruses or outside intrusions into the computer. The software also includes a firewall, online identity protection, and website authentication. The online identity protection will protect a user’s confidential information from being accessed from their computer. Website authentication lets the user know if the website is one that can be trusted. Automated backup and restore will protect the computer from losing any of its information and will restore the system automatically. All-in-one computer security systems can also include antispam software, which will protect a users email being bombarded by spam. Basically, all of these features included in the all-in-one computer security systems will make it so the user can feel safe when turning on their computer. Users have so much personal information saved to their computer such as passwords, financial information, and other personal information that these all-in-one computer security systems are necessary to protect all of this information from hackers. If this information were to be obtained by one of these…

    • 413 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Computers benefit from having an all-in-one computer security system in different ways depending one which system you install to your computer. All-in-one computer security systems are programs that keep not only your computer safe but all of your personal information. Many of the all-in-one computer systems, such as Nortons or AVG, protect the user with their personal stuff by securing all user names and passwords. They also clean computers from virus’, spy-ware, Trojan horses, worms, bots and rootkits. These are all things that can compromise your personal information and could cause the computer user to loose a large amount of information once their computer freezes. Usually the only way clean a computer when this happens is wiping everything off the computer and starting over. No user wants to go through this. I have personally had this happen three or four times due to getting virus’ that took over the computer. Now, I prevent that all from happening again. Not only do these security systems prevent the virus’ of all sorts but it also prevents spyware. Spyware is how hackers are able to get all of your personal information to use at their own disposal. Many of the security devices do live checks on the websites that you are visiting or try to visit to make sure that they are safe and real sites. If the site is a joke or dangerous to your computer it will not allow you to visit that site or will warn you before you continue on. Having a security system such as Nortons and AVG allows the user to download and share files without worrying about contracting a virus from the person/program they are downloading from. The best thing for to me that security systems offer is the firewall. The firewall prevents live attacks on your computer while you are on it. I have had Nortons block several attacks to my computer. The only thing that is a downfall to computer security systems is that they can cost quite a bit depending on which you get and what all they cover. To…

    • 382 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Aarong

    • 630 Words
    • 3 Pages

    There are some kind of issues of concern about antivirus such as Unexpected renewal costs, Rogue security applications, Problems caused by false positives, System and interoperability related issues, effectiveness, new viruses, rootkits, damage files, firmwall issues etc. There are…

    • 630 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Nids

    • 2445 Words
    • 10 Pages

    In today’s environment we need to contact each other through networks. Most of the devices or networks are interconnect to other devices or networks. As a result of this connection you are able to share your files, documents, etc. but when you are sharing you need to connect to a network and to the internet. When you connect to the internet you are taking a risk, cause your sharing files or documents may visible to others or intruders can steel your important files without a leaving a single mark. As a result of this Internet Security was introduced to protect your system from intruders.…

    • 2445 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    memory. Once a virus is in memory, it can spread to any floppy disk inserted…

    • 493 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    data security process

    • 352 Words
    • 2 Pages

    It is about keeping data safe. Many individuals, small business and major companies rely heavily on their computer systems. If the data in these computer systems is damaged, lost, or stolen, it can lead to disaster. Key threats to data security. Such process can be done by using Passwords and encryptions.…

    • 352 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Today the world is moving more quickly than ever before. One thing crucial to the advancement of our modern society is technology. While there are many great things about these new developments, there are still dangers. Setting up a personal home computer or allowing a teen to start a profile on Facebook, are two scenarios where it is critical to engage in proper security and privacy practices. These provisions will allow one’s self and one’s family to safely experience all that today’s technology has to offer.…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Good Essays

    The primary solution to these problems is that public awareness should be raised among all Internet users. For those who do activities like shopping or emailing should be equipped with knowledges to protect their precious information. This can be done by themselves or by the shoppers who own the sites. Another solution is that parents should impose stricter controls over their children. A good measure is to let children use the web at particular time under the supervision of their parents. The employers can also apply the same measures to their employees by limiting access to the web at particular time. Additionally, softwares like firewalls or content filters can be used to block access to unwanted sites.…

    • 383 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    avast and c++

    • 543 Words
    • 3 Pages

    This software has a great purpose in our computers. It helps to keep our pc safe by protecting it from different viruses that are captured through internet, external device, and many more. This software is not only for pc but Avast have made a great success over the years and have developed its production for smart phones, tablets and other devices. As now a days we must have a antivirus for our devices.…

    • 543 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Impact of Media

    • 466 Words
    • 2 Pages

    * 8. Internet Safety Ask your Internet provider or computer store about programs that block access to adult–oriented sites, “chat rooms,” and bulletin boards. Keep the computer in a high traffic part of the house. Find websites you think your children will enjoy and “bookmark” them. Teach…

    • 466 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Misuse of the Internet

    • 316 Words
    • 2 Pages

    Set up rules agreeing upon what time of day, how long, and what areas your child can access online. Signing an Internet family safety contract outlining your household's Internet rules can be helpful.…

    • 316 Words
    • 2 Pages
    Satisfactory Essays