Level 3 Organisation System Security

home

courses

introduction

criteria

tasks

notes

links

Introduction

Ensuring the security of computer systems and, crucially, the information they need is vital. Organisations and customers require confidence in these matters and security is critical to the successful deployment and use of IT. In this unit learners will consider physical security of computer systems from simple locks to complex biometric checks, as well as software-based security using, for example, passwords, access rights and encryption.

Potential threats to security arise in different ways. For example, security problems are sometimes related directly to malicious intent from internal or external sources, but in other circumstances such as software piracy, problems can occur by accident or unknowingly. The advent of e-commerce brought with it a whole new set of potential threats and issues for organisations to deal with.

Successful completion of this unit will ensure that all learners and new entrants to the IT industry understand the underlying principles of systems security as well as developing the knowledge to apply these principles to ensure the security of systems they will be using. Specific technologies, risks and preventative measures are considered as well as organisational issues, constraints and policies that impact security, along with the legislation specifically relating to computer use.

Security measures are usually in place to serve and protect our privacy and our rights. Security procedures can threaten these rights, for instance the right to have private email. The trade off between security and freedom raises important ethical issues and this unit also allows learners to consider ethical decisions and how they can be managed effectively in a modern organisation.

Learning outcomes

On completion of this unit a learner should:
1 Understand the impact of potential threats to IT systems
2 Know how organisations can keep systems and data secure
3 Understand the organisational issues affecting the security of IT systems.