top of page
UNIT 07-Organisational Systems Security
P3
Software Updating
Software Updating- this is where software of an organisation is updated in order to keep data protected, and keep the system of the...
IDS
IDS (intrusion detection systems)- Intrusion detection system is the final method of physical security, this is like a database which is...
Firewalls
Firewalls- is a protection mechanism it is used prevent unauthorised access to an network, and it also enables remote access to the...
Mirroring
Mirroring- this is where a bogus website, is created looking similar to a website, for example HSBC, could have a counterfeit site...
Use of BackUps
Use of backups- is another security method, it is basically backing up/having a spare copy of your data or files, RAID is the method...
Diskless Networks
Diskless Networks- is a network without a physical disk required, these networks are used by users as it enables them store their...
Passwords
Passwords- is another security method, passwords are a security measure implemented onto all computerised service and all users accounts,...
Levels of Access to Data
Levels of access to data- is another security method, it is about the reading, writing and access permissions users have on an network,...
Audit Logs
Audit logs- is a log which is used to record all/specific activity, which occurs on an business network, it is done for several reasons,...
bottom of page