Ensuring the security of computer systems and, crucially, the information that is held on computer systems is vital. Organisations and customers require confidence in these matters and it is critical to the successful deployment and use of ICT.
Security in this unit covers physical security of computer systems as well as software-based security using, for example, passwords, access rights and encryption. Occasionally, security problems relate directly to malicious intent but in other circumstances, for example software piracy, they can occur by accident or unknowingly.
Learning outcomes
1 Know potential threats to ICT systems and organisations 2 Understand how to keep systems and data secure 3 Understand the organisational issues affecting the use of ICT systems
Ensuring the security of computer systems and, crucially, the information that is held on computer
systems is vital. Organisations and customers require confidence in these matters and it is critical
to the successful deployment and use of ICT.
Security in this unit covers physical security of computer systems as well as software-based security
using, for example, passwords, access rights and encryption. Occasionally, security problems
relate directly to malicious intent but in other circumstances, for example software piracy, they can
occur by accident or unknowingly.
Learning outcomes
1 Know potential threats to ICT systems and organisations
2 Understand how to keep systems and data secure
3 Understand the organisational issues affecting the use of ICT systems
Contacts
SOW
Assignments
Session 1
Session 2Threats to ICT Systems