Prevention of deliberate misuse?
Prevention of accidental misuse?
What operational procedures could the company implement to prevent misuse?
What are the factors the company should take into account when designing a security policy?
What are the factors that a company will consider when deciding how much to invest in security in order to reduce risk?
Describe the use of user accounts and logs as a way of ensuring the confidentiality of customer records
- allocation of passwords - managing user accounts by allocation of access levels to users
Explain factors the company should take into account when designing its security policy?
Physical security - involves protecting hardware and software using physical rather than software methods either to restrict access to the computer equipment or the storage medium (locks, guards, biometric methods)
Prevention of misuse using logical (software) methods - user ids, passwords, levels of access
Operational procedures including disaster recovery planning and dealing with threats from viruses, back up, updating antivirus
Staff code of conduct e.g downloading from the Internet
Describe in detail factors an organisation needs to consider when producing a risk analysis?
Identify potential risks e.g viruses, fire, natural damage, hacking, systems failure, fraud
Likelihood of risk occurring - some things such as power cut are inevitable but explosions much less likely, managers have to assess e likelihood of each risk occurring and put in the necessary security
Short term and long term consequences of threat - resources (staff equipment etc) need to be directed towards recovering the data, may have to pay compensation, financial loss due to loss of business through not being able to take orders
How well equipped is the company to deal with threat (what procedures are in place) - has to be reviewed periodically because of changing needs - disaster recovery programme - back up strategy
Explain with reasons what should be included in a disaster recovery plan
Explain why the practise should have a security policy and give two examples of what this should contain, other than user accounts and logs
DPA puts an onus on the practise to keep this information secure because of its potential for misuse.
Rules on passwords
Access rights
Firewalls
Describe ways in which an employee can misuse the organisations ict facilities and give two possible penalties for misuse
Describe in detail factors the college should take into account when deciding how to develop, control and minimise risk to data?
Identify potential threats
Likelihood of risk occurring
Short and long term consequences of the threat
How well equipped is the college to deal with threat
How much money the college has
Identify a problem that could arise if steps are not taken to minimise risk, discuss its possible impact and describe in detail a suitable strategy to overcome it
Example problem; staff unaware of who actually is I’m college this could be very dangerous if there is a fire or looking for an at risk pupil
Steps ; have a back up system which staff could have emergency access to lookup information
Other points : disaster recovery system, e,ploy a RAID system
Discuss in detail the potential threats to data and the possible consequences of accidental or deliberate destruction of data. Illustrate your answer with distinctly different examples in each case
Threats; Terrorism Natural disasters Sabotage Fire Theft
Consequences
Loss of business and income
Loss of reputation
Legal action
Methods which could be used to prevent the deliberate destruction or misuse of data
Methods for controlling access to computer rooms
Methods if securing integrity of transmitted data e.g encryption
Methods including private and public keys
Call back procedures for remote access
Establish firewalls
Use virus scanners
Proxy servers
Password systems