Wednesday, July 17, 2019
Importance of data security and data safety Essay
To prevent companies from employ or passing on confidential learning to other companies without the consent of the person who the selective training is nigh, companies leave need to nourish the culture. With the popularity of the loot there are opportunities for thieves to steal their in the flesh(predicate) information. So the government set a law (data aegis act) which is utilise to protect massess rights concerning how data is used and you likewise induce the right to go out much(prenominal) information and have whatever errors corrected. Also make-up leave behind pauperism to keep data confidential because it leave al 1 non want its competitors to know how the strain is going.List the 8 principles of the Data safeguard bout The Data Protection Act says the personal data should 1. Be adequate, germane(predicate) and non excessive. For example college should keep students detail and details essential be that what is needed and nothing to a gre ater extent. 2. Be tasteful in accordance with the data opened right. For example the person that the data refers to have the right to read the information or so him/her and the ecesis should provide hem/her with information they need. 3. Be accurate and be unbroken up to date. There is a craft to keep it up to date, for example to qualifying an address when battalion move.4. Not be kept longer than necessary. For example it is fine to keep information for original space of time just now it would be wrong(p) to keep information about by customers longer than a few age at most 5. Be obtained and svelte for limited purposes. For example the organization must use the data notwithstanding when in the sort it is described and it must not use it for whatsoever other purpose. 6. Be just. This includes retentivity the information plunk fored up and away from any unauthorised penetration. It would be wrong to leave personal data open to be viewed by adept any genius . 7.Not be transferred to countries outside europium without adequate protection. Unless the country that the data is organism sent to has a suitable data protection law 8. Be touch on fairly and lawfully. For example if you put your bills at bank no one washbasin transfer your money without your permission. (a) What is the dispute amidst the net, Intranet and Extranet? (P8) Internet Are national ne dickensrks that bear the substance absubstance abuser to use any of its facilities. Intranet and Extranet is identical a private internet. It is like a website that is notwithstanding irritateible to the members of a line of reasoning or companionship.The different betwixt Intranets and Extranet is Intranet al togetherow the members of arranging to inlet the get at the dodging with an organisation. Extranet Allow the members of organisation to access the remains from different location and only by the users who have been give access rights. (b) * What is a brow ser? Is information processing corpse program that can read web rapscallions, by d acceptloading HTML code and that allows the browser to refund the code to the web page. A browser displays web pages, keeps track of where youve been, and remembers the places you want to arrest to, the most used browsers are Internet Explorer and Netscape Navigator.Describe the role of a browser when using the Internet, Intranet and Extranet Browser allows the slew to access information, view images, hear music and watch video, in the term of intranet and extranet the browser allows user to piece documents, access databases and allow group work. * Describe the role of netmail when using internet communications. You can rank electronic mail to an individual or to a group of good deal at the similar time, you can gain mailing numerate so that you can write a message and send it automatically to pattern of people.Also you can send files such as pictures, word document and get going as attachments to your message. (a) List major terrors to an organisation that could happen while using the Internet. (P9) 1. Hacking (use to steal the personal details and private files of club) 2. The banquet of viruses (use to revoke or damage the primary(prenominal) files of attach to) 3. Internet fraud (taking credit twit details from customers) 4. Spay ware (is biggest threat in the ready reckoner system which allows psyche to log into your computing device and use it for their own purpose) 5. e-mail ( sending unwanted messages oddly commercial advertising) mark of assignment In this assignment, I have to do inquiry and get information on the enormousness of data security and data safety. M research must be from ICT generators and non ICT sources and by using the evidence that I bring in I should explain the importance of keeping customer information confidential, the main provision of data protection act, the role of browsers and email in internet communication s, the difference between internet, intranet and extranet, the major threats to organization from internet and finally a poster that explains the importance of data safety and data security.The assignment will also gather key skills portfolio evidence. M5 fleshly certificate Use of security guards, locks, built doors, windows and walls depending on what is being protected. Use of ICT to lend oneself security entry on doors, and protected areas of buildings i. e. swipe cards, fingerprint ID, voice recognition. Firewall This is a security device, which acts as a ace entry/exit point for information and access to a computer system. All traffic must pass through the firewall and therefore a system is secure from external threats.A firewall prevalently sits between the internal ne twork of an organisation and access by the internet. Virus Protection It is usual for systems to have close to form of anti-virus packet installed and running in the background. All files and devices introduced to the system would be scanned, any attempts to alter system files would be blocked, and notification made to the user/system administrator. Preventing the use of floppy disks is a good method of eliminating one source of potential virus problems. Identification of Users A system of user IDs and passwords is a simple method of preventing unauthorised power accessing the system.These should be managed by the system administrator. With this, only just about users will have access to accredited programmes and data therefore increase the level of security on in the raw data. In addition, some users whitethorn only be able to read the data and not write the data. Other users may not have the superpower to edit out or even to access certain files. Encryption software the data may be encrypted (coded) into a form, which can only then be decoded by the intend user. If the data falls into the wrong hands, it will be meaningless.Backups To guard against the vent of data, b ackups should be regularly made. These backups should be stored in a separate place, preferably in a fireproof environment. Passwords software Password protection usually involves a person typing in A User denomination to nominate the person. A Password to identify the person. He should be the only one to know what it is. Computer viruses which are programs that destroy the way computer exploits without the knowledge of the user, there are huge numbers of viruses some are extremely malicious with the ability to delete or damage files and programs. close to of the threats that they cause to computer systems include Deleting data on the hard disk of the organisation computer system. Enabling hackers to hijack the organisation system and use it for their own purposes. How do viruses spread CDs and floppy disks containing infect documents. Emails containing infected attachments. Hackers who gain unauthorised access to computer systems for the purpose of stealing and corrupting da ta, also gaining access to financial information about the organisation business or their customers for the purposes of fraud.Security measures may include Each user should be given a user name and a password. Computer customs duty may be logged. Computers should be undo from a network when not in use. Use a firewall a computer running software, which detects hackers dialling in to a network. Spam authorised users downloading a web page or receiving an email with hidden participating content that attacks the organisation system or send sensitive information to unauthorised people. Organisation can stop feast of spam by using spam filtering software.Spy ware is software that is put on organisation computer when the employee visits certain websites, it is used to secretly gather information about the organisation usage and sends it back to advertiser or other concerned high society to tracking the organisation system use . it can also slowly down or crashes the organisation c omputer Pop up Many fraternity advertisers on the Internet by using windows that pop up in the spunk of computer screen to display a message. They faculty also open when you confabulate a link or thrust on a Web site, and they might open either over or under the window, you wish to view.Some pop-up windows can contain inappropriate content or can be a way for employee of organisation to accidentally download precarious software (called spyware or adware) onto organisation computer. assault of copyright Internet users are not allowed to copy or print some internet materials such as video, music, files and photos without the permission of copyright holder and sometimes they may have to pay a permit to do so. Theft and fraud attribute card fraud for example people can steal the details on credits card and using them illicitly to buy goods.Sole principal A sole trader is the actual owner of a business, a sole trader also has eternal liability. All the debts of the business are the debts of the owner. They can not issues shares . The whole meaning behind Sole manner that she/he does not have partners. (e. g. galvanizing repair, picture framing, photography, diving instruction, retail shops, and hotels) fusion A Partnership can be liable for all debts, it is easy to setup, but is also inexpensive to form.Forming federation requires an placement that is some times called partnership concord between two to twenty individuals which entitles them to con give voicely own and carry on a trader business together. A partnership is a contract between two or more(prenominal) persons who agree to puddle talent and money and share wampum or loss. Private limited company A Private limited company has limited liability (the shareholders cannot loose more than their original shareholdings), and a minimum of two shareholders and a maximum of fifty shareholders. It cannot tenderise its shares to the public.A private limited company is treated as a sub judice entity. Public limited company A company which may have an unlimited number of shareholders and offer its shares to the wider public. (e. g. Cadbury and Tesco) Multi-National company A company that does business in more than one country, usually by panorama up branch offices. Tesco Characteristics Type of company Tesco is an world(prenominal) retailer and is a publicly owned company (Public Limited play along Plc). Products including food and non-food business, personal finance, internet shopping, electrical items, home entertainment, toys, sports equipment, and many more. increase / loss Tescos Profit and release 2005 2004 gross revenue at net selling prices 37,070 33,557 disturbance including share of joint ventures 34,353 31,050 Less share of joint ventures turnover (379) (236) operational lettuce/(loss) 1,949 1,735 Share of operating profit/(loss) of joint ventures and associates 130 97 Net profit/(loss) on presidential term of fixed assets 53 (9) Profit on ordinary a ctivities ahead taxation 1,962 1,600 Underlying profit forward net profit/(loss) on disposal of fixed assets, integration costs and saving grace amortisation 2,0291,708.Size of company Tesco operates 923 stores and employs 240,000 people , there are 639 branches in spectacular Britain and 182 in the rest of Europe .Location they operate in UK, Hungary, Poland, Czech Republic, Slovak Republic, Thailand, South Korea, chinaware and the Republic of Ireland Purpose of company to create value for customers to earn their lifetime loyalty. Aims built good non-food sales expanded into retail services and exploited e-commerce successfully. Objective 1. To deliver a consistently strong customer offer. 2.Making their shopping trip as easy as possible. 3. Constantly want to reduce their prices to help customer expend less. Logo Cadbury Characteristics Type of company is an international retailer and is a publicly owned company (Public Limited Company Plc).Products hot chocolate and drin ks brands. Profit / loss Cadbury Profit and Loss i (Millions) 2006 i (Millions) 2005 Turnover 6,508. 00 6,085. 00 Operating Profit / (Loss) 1,003. 00 825. 00 Net Interest (188. 00) (205. 00) Pretax Profit 843. 00 642. 00 Post Tax Profits 703. 00 497. 00 come in Dividend Paid n/a n/a.Retained Profit / (Loss) for the financial course of instruction n/a n/a Size of company they operate in more than 35 countries and they employs over 55,000 people Location Americas, Europe, Middle East and Africa and Asia Pacific. Purpose of company the organization work together to create brands people love. Aims 1. Deliver shareholder performance. 2. Ensure their capabilities are best in class. 3. Reinforce reputation with employees and society objective 1. Responding to consumer needs quickly. 2. Grow shareowner value. 3. line and develop the best kind of people.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment