Friday, January 31, 2020
IT Department BTEC Essay Example for Free
IT Department BTEC Essay Describe the various types of threats to organisations, systems and data P1 * Unauthorised access This category covers internal and external threats. Internal threats are things such as: Magic Disks A recovery or backup disk that has been modded to include viruses or key loggers. Man in the middle attacks People extracting sensitive and confidential information whilst posing to be a customer, or a legitimate company. Implanting Key loggers Applications designed to record key strokes and send them back to the hacker. External threats are this such as; Viruses Rouge applications designed to damage or make a system vunerable Trojans Applications designed to infiltrate a system often by posing to be a harmless file or embedded into another file. Piggybacking A term given to people who use someone elses internet connection without authorisation. This is often undertaken by logging onto an unsecured network without permission. Phishing Attempting to fool a user into believing you are a legitimate service attempting to gain sensitive information. Ã Damage to or destruction of systems or information. Damage to systems can occur when devices fail such as hard drives failing or natural disasters occurring in the workplace that could result in damaged or destroyed places. Such as: 1. Natural Disasters: This refers to what happens when data is lost as a result of natural disasters such as earth-quakes, floods, tsunamis, terrorists, fires and such. 2. Malicious Damage: This covers data that is lost, damaged, or stolen as a result of a hacker of some sort. A hacker can implant a virus onto a system in order to damage the system or simply steal data such as credit card data. 3. Technical Failure: Technical Failure covers when devices fail abruptly such a servers going down, power supply failing, hard-drives crashing ect. 4. Human Errors: is when someone makes a mistake which results in data being lost. Incidents such as people accidentally deleting files and pulling plugs and such. 5. Theft: Theft occurs when criminals gain access to an office building or other work environment and physically steal hardware and other entities that have a significant impact on the company (such as data). Ã Information security Information security refers to keeping sensitive data safe and confidential. An organisation would need to keep data complete, precise and up-to-date. Data such as bank details, blood types, addresses and other such information needs to be kept secure and confidential. Ã Threats related to e-commerce There are various security threats related to E-commerce. As websites that sell goods online rely solely on the availability and accessibility of an online store, they need to ensure the website is secure and not vulnerable to hackers. For example; Denial of Service attacks could prevent potential customers from purchasing goods and thus forth lose sales. Another example is website defacement which would also repel potential customers from buying online. There is also a threat of hackers implementing the man in the middle technique on behalf of particular online retailers which fools customers in believing the hacker is a legitimate worker of the website, this method could result in the hacker exploiting the customer and thus gaining the website a bad reputation. Ã Counterfeit goods Counterfeit goods effect creators, directors and artists as they cause a direct loss to potential income. Downloading counterfeit software, movies and music could result In a fine or lawsuit. Counterfeit goods are becoming increasingly popular as the ease of ripping DVDs, Music and Software makes it easier to access. Counterfeit goods may cause loss of business for companies. The loss of business then results in businesses having to raise prices to make up for loss of profit. Ã Organisational impact Security threats can cause loss or alteration of essential documents that the an organisation may need to function correctly. Loss of business followed by loss of income can also occur, this ultimately could result in bad reputation from potential customers. Systems going down could result in companies being unable to contact suppliers and customers. Circumstances of 4 security related threats on organisations p2 Phishing -This is the process of gaining information from someone by pretending to be a legitimate worker for a company and retrieving information for legitimate reasons. Phishing could result in customer details being leaked, distributed, and exploited. This could badly reflect on the company and lose the company business and income. Denial of Service Denial of Service is a process that involves a hacker overloading a server which results in the server being forced to shut down. This could result in loss of potential customers and thus profit. Piggybacking Piggybacking is the process of using a company internet connection without having authorisation to use it. This can severely effect bandwidth and damage company productivity. Piggybacking could result in systems lagging and becoming slow, this would result in workers being unable to do there job efficiently and at an optimised pace. There is also a threat posed by people using a companies network to browse illegal content to which the company would have to take responsibility. Man in the middle attack This is the process of being directly involved in communicating with both parties, claming to be one another. The outcome is both parties believe they are speaking to eachother, but they are actually talking to someone else. This method results in the man in the middle acquiring sensitive information such as credit card details from either party. This could result in the middle man leaking sensitive customer information such as customer addresses and more importantly; bank details. This could then result in the company getting a bad reputation or being taken to court for breaching data protection. The man in the middle could also waste company time and as a result; money. Countermeasures Implemented to reduce risk of damage to systems p3 p4 Countermeasures Vermason could implement to protect physical systems p3: CCTV This would work as both a visual deterrent to prevent thieves and vandals breaking into a building and causing damage or stealing systems and would also enable the company to keep an eye on potentially rouge employees that may steal data or embed viruses into systems. Sheilding Network Cables and Wirless Communications Data travelling via electro-magnetic or radio transmissions can be vulnerable to being remotely monitored because the copper data cable can be analysed to discover what data is travelling along the line. Fibre optic is the safest variation of network cabling and cables can be shielded to prevent data being tapped into. This would be a great countermeasure to prevent sensitive data from being leaked or exploited. Intrusion Detection Systems Systems such as proximity alarms can prevent burglars breaking into a building and can be set-up to call the police upon break-in. This works as both a deterrent; because warning potential burglars of alarms would prevent them from breaking in. And also as a countermeasure to attempt to catch anyone with malicious intent. Countermeasures Vermason could implement to protect network security p4: Backups Backups are an essential countermeasure in offices. If there was an electrical fire or other natural disaster that could result in loss of data, this would insure that all essential data such as databases the company requires to undertake work related tasks are still there aswell as contact, supplier and customer information so that they do not need to be re-acquired. Passwords Passworded systems can be implemented to secure individual workers within the company, it firstly provides an element of data security for each individual (eg; sensitive information that may be kept on a user account) and also holds each user responsible for there own actions on the computer under there own user account. More importantly; passwords ensure that only legitimate employees have access to important company files and other such potentially confidential information. Firewalls A firewall would prevent unauthorised access from outside the network. It does this by scanning data packets coming onto the computer and ensuring that they are safe, it also is responsible for actively preventing viruss such as Trojans being downloaded from the internet and onto the network computers. Installing a firewall would prevent hackers from accessing the network and stealing data or causing damage.
Thursday, January 23, 2020
The One Child Policy and Gender Inequality Essay -- chinese culture,e
Given the high sex ratio in recent China population report, the abnormally excessive male birth exemplifies the persistence of son preference on womenââ¬â¢s fertility behavior. Son preference rooted in Chinese agriculture-based economy and historical feudalism, in consistence with the reliance on laborers and continuing the family line. Older people prefer to depend on their sons to get financial and physical support, while daughters are regarded as property of their husbandââ¬â¢s family since the day of marriage. However, the wish of having multiple children, especially boys, was challenged by the strict One Child policy in 1979. The One Child policy, also known as Family Planning policy, was implemented across the country as one of fundamental national policies under the administration of Population and Family Planning Commission. Based on the purpose of lowering fertility rates to ease social pressure and improve living standard, a married couple is only allowed to have one child with some exceptions made for some ethnic minorities and rural families. The majority of citizens are classified by ethnics and occupations to fit the specific regulations of compensations and punishments to prevent them from having a second child (Li, J., & Cooney, R, S. 1993). This proposal eventually triggered a profound introspection which chronically melted patriarchal cultures. The broad topic of how governmentââ¬â¢s decisions altered social norms is discussed within five sociological studies in my essay in allusion to the impacts of One Child policy on gender inequality. Key questions Gender inequality involves ideological preference and physical loss of equal opportunities to gain. The five articles examined the indirect effort of One Child policy on... ...onal Journal of Educational Development, 5, 474-486. Li, J., & Cooney, R, S. (1993). Son preference and one child policy in china: 1979-1988. Population Research and Policy Review, 12(3), 277-296. Liu, F. (2006) Boys as only-children and girls as only-childrenââ¬âparental gendered expectations of the only-child in the nuclear Chinese family in present-day China, Gender and Education, 18(5), 491-505 Merli, M. G., & Smith, H. L. (2002). Has the Chinese Family Planning Policy been successful in changing fertility preferences?. Demography, 39(3), 557-572. Ming,T., & Lynne,R. (2002). The only child and educational opportunity for girls in urban China. Gender & Society, 16(1), 74-92. Zhai, F.,&Gao, Q. (2010). Center-based care in the context of one child policy in China: Do child gender and siblings matter?.Population Research and Policy Review, 29(5), 745-774.
Wednesday, January 15, 2020
How to Write an Effective Thesis for a Comparative Essay
No matter what your major, there's usually no escape from English literature and composition classes and a compare-contrast essay assignment. Many students get nervous when their professors ask them to write an essay about the similarities and differences between two or more texts or ideas, especially when writing the thesis for the essay; however, writing a thesis for a compare-contrast essay is not as difficult as you may think.InstructionsRead the assignment sheet carefully before you begin so you can follow the professor's instructions exactly. Each professor usually has his own idiosyncrasies, so underline everything the professor expects you to include in the thesis. While writing the thesis, refer back to the underlined notes. 2Make a list of similarities and differences between the texts, ideas or events.Sponsored Links Simple Project TemplateYes. It's easy. Nothing to install. Try it Free! www.smartsheet.comNarrow down similarities and differences to specific ideas to avoid writing a compare-contrast thesis that is too broad. For example the compare-contrast thesis, ââ¬Å"The media depict people in different roles compared to the realities of the general population,â⬠is too general.Begin your statement with words like whereas, while, even though, and although to suggest a contrasting element will follow. For example: Although the media depict most women as housewives and stay-at-home mothers, in reality many women work full time and put their children in daycare.Make sure the thesis for a compare and contrast essay compares and contrasts two or more ideas. One of the most common basic ways to write a thesis statement for a compare contrast essay is as follows: While Jane Austin's novel ââ¬Å"Pride and Prejudiceâ⬠underscores themes of pride, prejudice and women and marriage, and Mary Shelly's story ââ¬Å"Frankensteinâ⬠reveals themes of madness, the sublime, and justice, it is apparent by juxtaposing these two novels that most women during the early 19th century felt trapped in a patriarchal society that restricted the roles of women, especially in marriage. 6Familiarize yourself with literary devices other than theme for compare and contrast essays. Rhetorical devices such as allegory, characterization, climax, symbolism, foreshadowing, figurative language, simile, imagery, irony, metaphor, motifs, personification, tone and other devices can add interest to a thesis statement for a compare-contrast essay.Read more: http://www.ehow.com/how_5012335_write-statement-compare-contrast-essay.html#ixzz2rPnmEClT
Monday, January 6, 2020
The Beginning Of Colonial Life - 1060 Words
The beginning of colonial life started off with great living conditions. There was a lack of disease and good amount of clean drinking. These new conditions for the colonist added a few years to the life expectancies. Because of the new great life spans of the colonist, the growth of New England was at an all-time high. Even though there was a great start in New England, Chesapeake was far from growing at the time. It was full of disease; almost all of the men and women were widowers. And their children became orphans. Even though there were countless deaths, disease captured mostly European women. The men then began to have relations with African and Native American women. This then became known as miscegenation. Native Americans andâ⬠¦show more contentâ⬠¦The Native Americans then proceeded to take tactics from the Europeans. This then would help and give them an advantage in fight. Both sides of the Native American groups fought on this conflict. Washington then gave up and soon the Colonial militia was taken over by General Braddock, all because the French advanced in their proceedings of Fort Necessity. In 1755 the French were victorious until 1758 when the British won a series of battles. The British captured the French city of Quebec in 1759 while in 1760 the French signed a peace treaty with the British. In this treaty Canada will no longer be controlled by France. All the while the British allowed religious freedom to also take place here, which still was not present in the other thirteen colonies. The end of the war was official with the Treaty of Paris. Then there was the Treaty of Paris. This is when France surrendered Canada to Britain with Louisiana under Spanish Control. These wars doubled the debt for the English in its colonies and England. Since there was an extensive amount of British troops, taxes were increased and this caused the American Revolution that was an anti- British movement. Furthermore the Colonial period first had a grea t growth while others such as Chesapeake had numerous deaths. Britain and France had ongoing conflicts over control, the Native Americans and Africans then became involved while the militias were taken
Subscribe to:
Comments (Atom)