4
DStainton/BTEC/CompSys/SOW/FD BTEC Level 3 Certificate/ Subsidiary Diploma/Diploma/Extended Diploma in Information Technology (QCF) Scheme of Work for Organisation Systems security – unit 7 Overview Learning outcomes 1 Understand the impact of potential threats to IT systems 2 Know how organisations can keep systems and data secure 3 Understand the organisational issues affecting the security of IT systems.

BTEC Level 3 Certificate/ Subsidiary Diploma/Diploma ... 7... · DStainton/BTEC/CompSys/SOW/FD BTEC Level 3 Certificate/ Subsidiary Diploma/Diploma/Extended Diploma in Information

  • Upload
    vubao

  • View
    215

  • Download
    0

Embed Size (px)

Citation preview

Page 1: BTEC Level 3 Certificate/ Subsidiary Diploma/Diploma ... 7... · DStainton/BTEC/CompSys/SOW/FD BTEC Level 3 Certificate/ Subsidiary Diploma/Diploma/Extended Diploma in Information

DStainton/BTEC/CompSys/SOW/FD

BTEC Level 3 Certificate/ Subsidiary Diploma/Diploma/Extended Diploma in Information Technology (QCF) Scheme of Work for Organisation Systems security – unit 7 Overview Learning outcomes 1 Understand the impact of potential threats to IT systems 2 Know how organisations can keep systems and data secure 3 Understand the organisational issues affecting the security of IT systems.

Page 2: BTEC Level 3 Certificate/ Subsidiary Diploma/Diploma ... 7... · DStainton/BTEC/CompSys/SOW/FD BTEC Level 3 Certificate/ Subsidiary Diploma/Diploma/Extended Diploma in Information

DStainton/BTEC/CompSys/SOW/FD

Num of lessons

Teaching topic

Delivery methods

Guidance

2 Understand the impact of potential threats to IT systems

Teacher input, group/individual research/activities

Potential threats: malicious damage; threats related to e-commerce; counterfeit goods; technical failures; other eg human error, theft of equipment

2 Understand the impact of potential threats to IT systems

Teacher input, group/individual research/activities

Malicious damage: internal; external; access causing damage eg viruses; access without damage; specific examples eg phishing, identity theft, piggybacking, hacking

2 Understand the impact of potential threats to IT systems

Teacher input, group/individual research/activities

Threats related to e-commerce: website defacement; control of access to data via third party suppliers; other eg denial of service attacks

2 Understand the impact of potential threats to IT systems

Teacher input, group/individual research/activities

Counterfeit goods: products at risk eg software, DVDs, games, music; distribution mechanisms eg boot sales, peer-to-peer networks

2 Understand the impact of potential threats to IT systems

Teacher input, group/individual research/activities

Organisational impact: loss of service; loss of business or income eg through loss of customer records; increased costs; poor image

2 Understand the impact of potential threats to IT systems

Teacher input, group/individual research/activities

Information security: confidentiality; data integrity; data completeness; access to data

4 Assessment Individual assessment

Assignment 1 covering criteria P1 & M1

Page 3: BTEC Level 3 Certificate/ Subsidiary Diploma/Diploma ... 7... · DStainton/BTEC/CompSys/SOW/FD BTEC Level 3 Certificate/ Subsidiary Diploma/Diploma/Extended Diploma in Information

DStainton/BTEC/CompSys/SOW/FD

2 Know how an organisation can keep systems and data secure

Teacher input, group/individual research/activities

Physical security: locks; visitors passes; sign in/out systems; biometrics eg retinal scans, fingerprint, voice recognition; others eg guards, cable shielding

4 Know how an organisation can keep systems and data secure

Teacher input, group/individual research/activities

Software and network security: encryption techniques eg public and private key; call back; handshaking; diskless networks; use of backups; audit logs; firewall configuration; virus checking software; use of virtual private networks (VPN); intruder detection systems; passwords; levels of access to data; software updating; disaster recovery eg backup systems, whole system replacement, tiers of recovery

6 Assessment Individual assessment

Assignment 1 covering criteria P3, M2, D1, P4

4 Understand the organisational issues affecting the security of IT systems

Teacher input, group/individual research/activities

Security policies and guidelines: disaster recovery policies; updating of security procedures; scheduling of security audits; codes of conduct eg email usage policy, internet usage policy, software acquisition, installation policy; surveillance policies; risk management; budget setting

2 Understand the organisational issues affecting the security of IT systems

Teacher input, group/individual research/activities

Employment contracts and security: hiring policies; separation of duties; ensuring compliance including disciplinary procedures; training and communicating with staff as to their responsibilities

2 Understand the organisational issues affecting the security of IT systems

Teacher input, group/individual research/activities

Laws: legislation eg Computer Misuse Act 1990; Copyright, Designs and Patents Act 1988; privacy and compensation requirements of Data Protection Act 1984, 1998, 2000

Page 4: BTEC Level 3 Certificate/ Subsidiary Diploma/Diploma ... 7... · DStainton/BTEC/CompSys/SOW/FD BTEC Level 3 Certificate/ Subsidiary Diploma/Diploma/Extended Diploma in Information

DStainton/BTEC/CompSys/SOW/FD

2 Understand the organisational issues affecting the security of IT systems

Teacher input, group/individual research/activities

Copyrights: open source; freeware; shareware; commercial software

2 Understand the organisational issues affecting the security of IT systems

Teacher input, group/individual research/activities

Ethical decision making: eg freedom of information versus personal privacy (electoral roll, phone book and street maps put together); permission eg to use photographs or videos, CCTV footage

2 Understand the organisational issues affecting the security of IT systems

Teacher input, group/individual research/activities

Professional bodies: organisations eg Business Software Alliance (BSA), Federation Against Software Theft (FAST), British Computing Society (BCS), Association of Computing Machinery (ACM)

6 Assessment Individual assessment

Assignment 1 covering criteria P5, P6, M3, D2

2 Portfolio check Individual assessment, individual learning plans

Portfolio building session targeting Pass criteria to ensure all students have achieve All pass criteria