Example: marketing

BTEC Level 3 Certificate/ Subsidiary …

DStainton/BTEC/CompSys/SOW/FD BTEC Level 3 Certificate/ Subsidiary Diploma/Diploma/Extended Diploma in Information technology (QCF) Scheme of Work for Organisation Systems security unit 7 Overview Learning outcomes 1 Understand the impact of potential threats to IT systems 2 Know how organisations can keep systems and data secure 3 Understand the organisational issues affecting the security of IT systems. DStainton/BTEC/CompSys/SOW/FD Num of lessons Teaching topic Delivery methods Guidance 2 Understand the impact of potential threats to IT systems Teacher input, group/individual research/activities Potential threats: malicious damage; threats related to e-commerce; counterfeit goods; technical failures; other eg human error, theft of equipment 2 Understand the impact of potential threats to IT systems Teacher input, group/individual r

DStainton/BTEC/CompSys/SOW/FD BTEC Level 3 Certificate/ Subsidiary Diploma/Diploma/Extended Diploma in Information Technology (QCF) Scheme of Work for Organisation Systems security unit 7

Tags:

  Technology

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of BTEC Level 3 Certificate/ Subsidiary …

1 DStainton/BTEC/CompSys/SOW/FD BTEC Level 3 Certificate/ Subsidiary Diploma/Diploma/Extended Diploma in Information technology (QCF) Scheme of Work for Organisation Systems security unit 7 Overview Learning outcomes 1 Understand the impact of potential threats to IT systems 2 Know how organisations can keep systems and data secure 3 Understand the organisational issues affecting the security of IT systems. DStainton/BTEC/CompSys/SOW/FD Num of lessons Teaching topic Delivery methods Guidance 2 Understand the impact of potential threats to IT systems Teacher input, group/individual research/activities Potential threats: malicious damage; threats related to e-commerce; counterfeit goods; technical failures; other eg human error, theft of equipment 2 Understand the impact of potential threats to IT systems Teacher input, group/individual research/activities Malicious damage: internal; external; access causing damage eg viruses; access without damage.

2 Specific examples eg phishing, identity theft, piggybacking, hacking 2 Understand the impact of potential threats to IT systems Teacher input, group/individual research/activities Threats related to e-commerce: website defacement; control of access to data via third party suppliers; other eg denial of service attacks 2 Understand the impact of potential threats to IT systems Teacher input, group/individual research/activities Counterfeit goods: products at risk eg software, DVDs, games, music; distribution mechanisms eg boot sales, peer-to-peer networks 2 Understand the impact of potential threats to IT systems Teacher input, group/individual research/activities Organisational impact: loss of service; loss of business or income eg through loss of customer records; increased costs; poor image 2 Understand the impact of potential threats to IT systems Teacher input, group/individual research/activities Information security: confidentiality; data integrity; data completeness.

3 Access to data 4 Assessment Individual assessment Assignment 1 covering criteria P1 & M1 DStainton/BTEC/CompSys/SOW/FD 2 Know how an organisation can keep systems and data secure Teacher input, group/individual research/activities Physical security: locks; visitors passes; sign in/out systems; biometrics eg retinal scans, fingerprint, voice recognition; others eg guards, cable shielding 4 Know how an organisation can keep systems and data secure Teacher input, group/individual research/activities Software and network security: encryption techniques eg public and private key; call back; handshaking; diskless networks; use of backups; audit logs; firewall configuration; virus checking software; use of virtual private networks (VPN); intruder detection systems; passwords; levels of access to data; software updating.

4 Disaster recovery eg backup systems, whole system replacement, tiers of recovery 6 Assessment Individual assessment Assignment 1 covering criteria P3, M2, D1, P4 4 Understand the organisational issues affecting the security of IT systems Teacher input, group/individual research/activities Security policies and guidelines: disaster recovery policies; updating of security procedures; scheduling of security audits; codes of conduct eg email usage policy, internet usage policy, software acquisition, installation policy; surveillance policies; risk management; budget setting 2 Understand the organisational issues affecting the security of IT systems Teacher input, group/individual research/activities Employment contracts and security: hiring policies; separation of duties; ensuring compliance including disciplinary procedures; training and communicating with staff as to their responsibilities 2 Understand the organisational issues affecting the security of IT systems Teacher input, group/individual research/activities Laws: legislation eg Computer Misuse Act 1990; Copyright, Designs and Patents Act 1988.

5 Privacy and compensation requirements of Data Protection Act 1984, 1998, 2000 DStainton/BTEC/CompSys/SOW/FD 2 Understand the organisational issues affecting the security of IT systems Teacher input, group/individual research/activities Copyrights: open source; freeware; shareware; commercial software 2 Understand the organisational issues affecting the security of IT systems Teacher input, group/individual research/activities Ethical decision making: eg freedom of information versus personal privacy (electoral roll, phone book and street maps put together); permission eg to use photographs or videos, CCTV footage 2 Understand the organisational issues affecting the security of IT systems Teacher input, group/individual research/activities Professional bodies.

6 Organisations eg Business Software Alliance (BSA), Federation Against Software Theft (FAST), British Computing Society (BCS), Association of Computing Machinery (ACM) 6 Assessment Individual assessment Assignment 1 covering criteria P5, P6, M3, D2 2 Portfolio check Individual assessment, individual learning plans Portfolio building session targeting Pass criteria to ensure all students have achieve All pass criteria


Related search queries