Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Samenvatting

Summary CD.D3 Demonstrate individual responsibility and effective selfmanagement in the planning and protection of an IT system. UNIT 7: IT SYSTEMS SECURITY AND ENCRYPTION | BTEC Computing

Beoordeling
4.5
(2)
Verkocht
10
Pagina's
14
Geüpload op
28-03-2021
Geschreven in
2018/2019

CD.D3 Demonstrate individual responsibility and effective self-management in the planning and protection of an IT system. UNIT 7: IT SYSTEMS SECURITY AND ENCRYPTION | BTEC Computing

Instelling
Vak

Voorbeeld van de inhoud

D3 Responsibility and self-management
Introduction

In this document, I will be demonstrating the different ways I have shown individual responsibility
and self-management. Both these will need to have been done effectively to ensure the planning
and protection of the IT system is carried out to offer the highest level of defence against both
external and internal threats.
Planning and recording

Throughout the process of developing the IT system security, I have planned out each stage so that it
covers every aspect of security - this includes physical and software security, and evolving policies
and procedures. By doing this planning, I made sure that I didn’t miss any parts of the network that
need protecting. The use of a Gantt chart allowed me to set time -based targets, which ensured that
every protection method would be undertaken in a formally fashion. Recording the work undertaken
was carried out at every stage, with documents and screenshots displaying what had been done to
enhance the security on the system. Feedback from others was collected in many ways, the first was
having weekly meetings to discuss the progress that had been made on certain projects and monthly
meetings to review and edit policies. These meetings were attended by members of management,
whilst emails were how other members of staff were able to get in contact with me. The feedback
gathered took many forms, with emails, meeting minutes and face -to-face conversations allowing
me to plan and record what work I needed to do next.




Figure 1.0: Gantt chart Figure 1.1: Progress table

Reviewing

To ensure that the protection applied to the network was effective, I had to undertake several
reviews and tests. These made sure that everything had been set up to the highest level and was
robust enough to stand up against external and internal threats. Involved within this was responding
to any issues that occurred, for example, finding that a firewall port was open - when it's not meant
to be - and closing it before any damage is caused. I also took feedback from fellow IT professionals;
this allowed me to be sent any issues that arose, fixing them and resolving the issue. My reviewing
process involved going through a number of tasks to identify any weaknesses in the system - this
was effective as it covered all aspects and scenarios on the network. Foll owing this, I wrote a
conclusion which looked over what was implemented and how it performed in the test. I found that




Unit 7: IT Systems Security and Encryption

, all my methods thoroughly protected the system without hindering the systems everyday use (e.g.
visiting certain websites, accessing certain folders).




Figure 2.0: Testing table Figure 2.1: Email

Professionalism

During my time working on the IT system, I had to maintain a level of professionalism which saw me
perform tasks as quickly as I could, whilst remaining calm in these under-pressure situations. When
undertaking this work, I had to use specific terminology with others to ensure they knew exactly
what I was talking about and the complexity of each task. In addition, I used formal language to
remain presentable, polite and professional - this was most evident in my emails, which show me
using formal language to ask and answer questions from colleagues. When answering emails from
others I had to be supportive to ensure their issues could be resolved, whilst showing leadership by
making clear I was the person to talk to if staff came across any problems with the IT system.
Anything that went wrong on the system was my responsibility, meaning I was accountable for
anything that happened. For this reason, I had to make sure that everything was configured correctly
to prevent liability to problems.




Figure 3.0: Email Figure 3.1: Email

Outcomes

In order to make recommendations or decisions I had to go through a number of different tests.
These involved checking whether protection techniques have worked by looking at all avenues and
testing using varied techniques. By going through I ensured that me final decision was high-quality or
that the recommendation had systematic evidence behind it. To ensure all outcomes were high-
quality, I had to change anything that could be seen as a weakness - this maintains the highest level
of protection and makes sure that all recommendations are fully justified. Decisions had to always
be based upon what was best to do, for example, closing Firewall ports and blocking certain
connections made sure that no external hackers could gain access to the network. When in
meetings, we would discuss what things could be changed/or added - talking about their benefit -


Unit 7: IT Systems Security and Encryption

Geschreven voor

Study Level
Publisher
Subject
Course

Documentinformatie

Geüpload op
28 maart 2021
Aantal pagina's
14
Geschreven in
2018/2019
Type
SAMENVATTING

Onderwerpen

$11.03
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Beoordelingen van geverifieerde kopers

Alle 2 reviews worden weergegeven
2 jaar geleden

4 jaar geleden

4.5

2 beoordelingen

5
1
4
1
3
0
2
0
1
0
Betrouwbare reviews op Stuvia

Alle beoordelingen zijn geschreven door echte Stuvia-gebruikers na geverifieerde aankopen.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
BTECcomputingANDbusiness
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
249
Lid sinds
5 jaar
Aantal volgers
160
Documenten
30
Laatst verkocht
3 maanden geleden

3.9

57 beoordelingen

5
26
4
13
3
10
2
5
1
3

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen