Reference no: EM132355187 , Length: word count:1000
IT Systems Security Assignment - Security Training
Learning Outcomes -
- Understand current IT security threats, information security and the legal requirements affecting the security of IT systems.
- Examine the techniques used to protect an IT system from security threats.
- Implement strategies to protect an IT system from security threats.
Assignment Brief and Guidance -
Case study - You work as a IT Security Specialist for a leading Security Consultancy. As part of your role, you need to train junior staff members on the tools and techniques associated with identifying and assessing IT security risks together with the organisational policies to protect business critical data and equipment.
IT Security professional revolves around protecting IT systems, this includes network, infrastructure and all other areas of IT. Securing information assets, customer data, financial information and other critical information is the key responsibility of an IT security professional.
Your Training should include -
1. Explain the different security threats that can affect the IT systems of organisations.
2. Explain the principles of information security when protecting the IT systems of organisations.
3. Explain why organisations must adhere to legal requirements when considering IT system security.
As a Trainer ask the trainees to Assess the impact that IT security threats can have on organisations' IT systems and business while taking account of the principles of information security and legal requirements. Evaluate the effectiveness of the techniques used to protect organisations from security threats while taking account of the principles of Information security and legal requirements.
Protection is one of the key part in any organisation from security threats, Explain how protection techniques can help defend an organisation from security threats.
Justify the choice of protection techniques used to defend an organisation's IT system from security threats.
Part of a training build up a activity to work on the following tasks:
1. Produce a plan to protect an IT system that meets organisational and legislative requirements.
2. Perform tasks to protect the IT system that meets the requirements given in the plan.
3. Review the extent to which the organisation's IT system has been protected.
4. Justify decisions made in producing the plan, showing how the IT system will be protected from security threats.
5. Enhance the protection of the IT system that meets the requirements given in the plan.
Evaluate the plan and the effectiveness of the protected IT system against requirements. Demonstrate individual responsibility and effective self-management in the planning and protection of an IT system.
Learning Outcome 1: Understand current IT security threats, information security and the legal requirements affecting the security of IT systems.
- Threat types
- Information security
- Legal requirements
- Impact of security breaches
Learning Outcome 2: Examine the techniques used to protect an IT system from security threats
- Physical security
- Policies and procedures
- Software-based protection
Learning Outcome 3: Implement strategies to protect an IT system from security threats.
- Group policies
- Anti-matware protection
- Firewall configuration
- Wireless security
- Access control
- Testing and reviewing protection applied to an IT system
- Skills, knowledge and behaviours.