Tuesday, January 20, 2015

Unit 1 Communications and Employability P7 + P8

P7 produce a personal development plan + P8 follow a personal development plan.


We just did some random thing in September when we joined the college that counted towards this criteria 

Unit 1 Communication and Employability P6

P6 communicate technical information to a specified audience

For this criteria i made a word document and a power point, both of these are below.






Unit 1 Communication and Employability P4

P4 Demonstrate a range of effective interpersonal skills

 This is a presentation that I have made on the subject of effective communication.
 This is the first page of the presentation that I have done. The first page probably should have been more like an index, indicating what was going to be included in the presentation instead of just jumping straight in. This page may also have a bit too much information on and should have been in bullet points.


Throughout the next slides there are quite a few formatting errors, for example 2 of the slides have a bullet point at the beginning and 2 of them do not. Again there is quite a lot of information on all of the slides which is good because they contain a lot of information however it could be hard to read while presenting which is why it should probably be formatted into all bullet points.
Besides the bullet point starting issue, the rest of the presentation is consistent with design the whole way through.

Unit 1 Communication and Employability P2

P2 explain the principles of effective communication

General Communication Skills
general communication skills can include being able to adapt to different audiences, this can include changing the type of language you use, depending on the age group of the people you're talking to and also the formality of the situation. you also have to take into account cultural differences, not only different languages but different regional accents can also be a problem.
Interpersonal skills
Interpersonal communication is communicating face to face, using both verbal and non verbal commutation, for example the tone of you voice, hand gestures, signing, body language, and allows you to take into account the reaction of the person you’re talking to through eye contact, facial expressions and body language
Potential barriers to communication
Some potential barriers to communication can be as serious as disabilities such as hearing impairments or as simple as a loud noise such as air conditioning distracting people. A way to overcome something like a hearing impairment is to use sign language or if someone speaks a different language all together then a translator may be extremely useful. 
Communication in writingspelling and grammar is incredibly important in today's society, especially when it comes to things like emails when maintaining an air of professionalism is vital and it's very important that you don't use slag or abbreviations like you would when you talk to your friends.

Tuesday, January 13, 2015

Unit 7 Organisational Systems Security M3

M3 Explain the role of ethical decision making in organisational IT security.

Just because something is legal does not mean that it is ethical. It may not be legally wrong to do something however it may be morally and therefore ethically wrong. Ethics are different from person to person as they are based on what you believe is right and wrong and what is acceptable, this makes it very had to write down a set of ethical rules that people should follow.

Organisations have to make ethical decisions about a lot of things but mainly about personal information.
Freedom of information is how government information can be available to the public on request. Before the internet examples of this where things like phone books, but now you can request all sorts of information about government spending etc. which is good because it means the public isn’t always kept in the dark about everything.
Freedom of information can also be a very bad thing. Using a website like yell.com you can very easily find someone’s name address and telephone number, and then use something like google street view to then see what the outside of their house looks like, and you could even look them up on Facebook to see if the posts the times that they’re working or if they’re going on holiday etc. this could make it extremely easy to burgle a house.
Permission is a major thing when it comes to ethical decisions. If you go to a school or college they will usually give you a permission slip to sign to say that they can take and use photos of you for things like their website or prospectus. This is not a legal requirement however it is ethically right.
 Google maps, for example, have recently started blurring out faces on street view. This again is not a legal requirement however they have decided that it is ethically right to do this. If they didn’t do this it might also cause a lot of complaints if people were in an incriminating position when the photo was taken. They can’t ask everyone that they took photos of for permission for the images to be online so instead they just blur out EVERYONE. 

Personally I think that in quite a few companies a lot of ethical decisions may be overlooked because they be extremely time consuming or expensive (for example handing out permission slips or going through and blurring every single person’s face on street view) and since they don’t have a legal obligation to do these things they do not. 

Unit 7 Organisational Systems Security M2

M2 how data transmitted over a network can be protected by encryption.

Encryption is a method of converting normal information such as text, images and media into a format which is unintelligible unless you are in possession of the key that is the basis of the conversion. Public/private keys are keys that are mathematically related. The public key can be widely distributed, among employees for example, and is used to encrypt data. The private key can decrypt the data only a few authorised people have access to the private key.
For example, one user wanted to send some sensitive information to another user, the sender of the information would encrypt the data with the receiver’s public key, and once they have received the data they can decrypt it using their private key. 
Encryption should be used for sensitive information, things like emails etc. and helps keeps things confidential.
An advantage of encryption is that once the data has been encrypted it is secure so not as much security is needed on the system, however this can also be a disadvantage as a lot of people’s jobs will then revolve around making sure that the key for the encryption is secure
Handshaking is a process where two communication devices continuously agree a method of data communication.
Virus checking software will often run in the background of any system. It will scan each file as it is being opened for any fingerprints which match the virus definitions. It will also attempt to identify any suspicious activity from a program. If a virus is detected then the antivirus software should take care of it before it can cause any problems. Software to detect and get rid of viruses is of massive importance as a virus can gain access to important information and could corrupt it.
One of the ways to make sure the system is safe is to have passwords on everything, and very hard to guess passwords that have a mixture of upper and lower case, numbers, letters and punctuation. An incredibly insecure password would be 'password' or 'password1' however having 'pA$sw0Rd7' would be much more secure. It is a lot harder to remember however and having such difficult to remember passwords have led to employees writing their passwords down and leaving them on sticky notes right next to their computer, and if the building gets broken into then they automatically have access to everything. this is why it is vital that people remember their passwords and not write them down.
Encryption is a method of converting normal information such as text, images and media into a format which is unintelligible unless you are in possession of the key that is the basis of the conversion. Public/private keys are keys that are mathematically related. The public key can be widely distributed, among employees for example, and is used to encrypt data. The private key can decrypt the data and is kept secret.
Handshaking is process where two communication devices continuously agree a method of data communication.
Use of backups is also extremely important in case the information gets corrupted or accidentally deleted. 2 copies of the backup should be taken, one to leave on the premises for easy access if information is needed quickly and one to be kept off the premises in case there is a fire or something similar which would mean both the original  and the backup data would be destroyed. there are different types of backup and these are as follows;
Incremental Backups: Involves storing only changed data since the last backup of any type.
Differential Backups: Involves storing only changed data since the last full backup.
Redundancy: A  term in meaning duplication of information.
RIAD: Stands for redundant array of independent disks. It is used as a live backup mechanism with
multiple hard disks maintaining multiple images of the data.
Mirroring: A backup server that ‘mirrors’ the processes and actions of the primary server fails. If the primary server fails, the backup server can take over without any downtime because it has mirrored the content of the primary server.
The tiers of recovery show what how prepared a company would be if all their information was wiped, these as follows;
Tier 0 – No off site data. Possibly no recovery. One power cut and all data is unsafe.
Tier 1 – Data backup with a no dark site. Backups are taken but no replacement location if system fails.
Tier 2 – Data backup with a dark site. Copies of data are taken and there is a centre available to transfer data.
Tier 3 – Electronic vaulting. Mirrored copies of the system state are continuously maintained.
Tier 4 - Point-In-Time copies. Remote copies of the data are the same as local data.
Tier 5 – Transaction integrity. The system ensures both copies are in tune with each other.
Tier 6 – Zero data loss. For fast systems, where a sudden fault, could result in some minor transactional data loss.

Tier 7 – Highly automated, business integrated solution. The system will do all the thinking for you.
Call Backs are used on dial up systems where network administrators can dial into a network and the network device will call them back. Carries a username and password to ensure that the channel is secure. It uses CHAP which stands for Challenge handshake authentication protocol.
A diskless network is very useful as it does not have a CD/DVD drive, USB ports or floppy disk drive. It stops users adding new devices such as USB sticks or CDs so data is not being stolen and it also stops data being easily transferred from a computer to a mobile storage device.
A firewall acts as a barrier between the computer and the internet, having a firewall makes it extremely hard for hackers and viruses to get onto the system. Firewalls are usually meant to stop malicious things from coming in but they can also be set up to prevent employees accessing dangerous sites or sending out information over email.

Unit 7 Organisational Systems Security M1

M1 Discuss Information Security


Confidentiality
Confidentiality is making sure that private information remains private, especially if it is things like addresses, dates of birth or medical histories of employees or customers. This information must be kept with the employer and can’t be distributed around.
Different employees in a company may have different levels of access to confidential information, and before they start work they should be made to sign a confidentiality agreement to make sure that they don’t share any confidential information.
Making sure that the data is stored in a safe place is also very important, if it’s stored on paper it should be kept in locked filing cabinets in locked rooms for example, and depending on how sensitive the information is it might have security guards as well.
If it is stored digitally then it should have a very complicated password that is changed often as well as a very secure system (very good antivirus etc).

Data integrity and completeness
This is making sure that any information that may be stored by a company is all correct and not missing anything. It is very important to regularly check that all the data stored is correct as if it is incorrect then this can lose money for the company if they have to spend ages sorting it out if one day they realise that all of their data is wrong, compared with doing it a little at a time.
This could even lead to people being hospitalised or even dying if for example a company that keeps medical records gets mixed up and people get the wrong prescriptions, or if the information isn’t complete and doesn’t mention a penicillin allergy for example.
Validation routines and input masking are ways to help make sure that all data is complete at the point that it is entered, for example if data is being entered into a database it will make sure that no letters are input into the ‘telephone number’ field, and that all necessary fields are filled.
A way to check if anything has changed with the data after it has been entered is for example with a dentists, every time you go they give you the option to change your address if you have moved or your mobile phone number if you have a new phone etc. so that it will be correct in their records.

Access to data
It is important to make sure that only people who really need to use certain data have access to it. Employees within an organisation will have different levels of access to data and this is usually determined by what job they do and how high up in the company they are. 
A reason why people may request data that they do not normally get access to is if they are a bank or loans company wanting to check a credit report, this can only be requested when someone applies for credit.
It is important to keep track of who within an organisation has access to what data, for example if data is stolen then the company can see all the people who had access to it which will narrow it down.
it is also important to make sure that who has access to what data is reviewed often to make sure that no one has access to any information that they do not need and this will make sure that the information is more secure.