Wednesday, March 6, 2019

Poor security Essay

With the current system there is no proper(postnominal) auspices policy, thence the current system is constantly open to unauthorised flock gaining rise to power to the data that is held in the filing cabinets. However, the accompany has an IT Policy that every exploiter has to sign. The current Security Policy states that, Members of the IT team atomic number 18 responsible for managing the companys Technology system. This involves utilize of administrator battle cry, which provides full access to specific systems. Access to Administrator level password must be inured professionally and ethically at all times.Any IT staff that use an administrator level password to read confidential or ad hominem learning (that would not normally be available to them) may be in breach this policy and subject to disciplinary action. whence all users of the database will have password that enables them access to the database. A password is a unique string of characters that a user types as an appellation code to restrict access to computers and sensitive files. The system compares the code against a shop classd list of authorized passwords and users.If the code is legitimate, the system allows access at the security level approved by the IT manager. With all this the database will be expert enough to stay to the rules of the Data Protection Act. This is the 1984 Act of sevens guaranteeing certain rights to individuals and control of the use of individualized data held on a computer. The most well known of the rights is that of examining a computer platter held by a- company by the individual in the data record. Why the DPA was brought in The power of the computerDuring the second half of the 20th century computers were acquire more powerful and easy to use. Companies, government and other organisations began to use them to neckcloth large amounts of selective data approximately people, such as their customers, clients and staff. Databases with this inform ation canister be quickly set up, searched, edited and accessed and take up slight space than paper records. Personal data on computer alternatively of paper records, computers were besides being employ routinely to keep personal data about people.This information included- Names Addresses Financial information Medical records Criminal records Employment history For example, being a piece of a sports club would mean that your name, age, medical details and payment record would be stored on a computer file. Ease of access to the information The information stored could be far more easily and flexibly used than if it was stored on paper. For example, a database could be searched to find all customers living in a particular area, to target them for special offer advertising.Searches of databases like this are much faster with computers and, in particular, information can be matched from atomic number 53 database to another far more than if it is stored on paper. The Database sect ion has more on searching. Communications networks Storing information about people on computers which are link to communications networks like the Internet or private company networks has also become important. This allows databases to be used across an organisation and be dual-lane between organisations very quickly. Misuse of information.With more and more organisations using computers to store and process personal information, there was a danger the information could be misused or could get into the wrong hands. Concerns A number of concerns arose about how this information could be used- Could it be easily copied? Could it be changed with inadequate evidence being left? Who could see this information? How accurate was the information? Was it be possible to build up detailed files on people without their knowledge or permission? The new system is able to pull copies of the whole database.To make sure that no information from the database is lost or damaged back up procedures is carried out every night. The reason for this is to cling to the data held on the database, which is crucial to both News Shopper and its travel and insurance companies. The backup cycle is carried out automatically each evening at 6pm this process takes approximately 4-6 hours. This consists of copying all files to disk and then transferred to attractive force tape. It is the Systems Administrators responsibility to ensure the rotation of tapes and keep back up livelihood up to date.

No comments:

Post a Comment