0% found this document useful (0 votes)
1K views3 pages

BTEC Assignment Brief: (For NQF Only)

Uploaded by

Jws
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1K views3 pages

BTEC Assignment Brief: (For NQF Only)

Uploaded by

Jws
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

BTEC Assignment

Brief

Pearson BTEC Level 3 Extended Certificate in Computing


Qualification
Pearson BTEC Level 3 Extended Diploma in Computing
Pearson BTEC Level 3 Foundation Diploma in Computing
Unit number and title
Unit 7: IT Systems Security and Encryption

A: Understand current IT security threats, information


Learning aim(s) (For NQF security and the legal requirements affecting the security
only) of IT systems
B: Investigate cryptographic techniques and processes used
to protect data
Assignment title
IT security threats and cryptography
Assessor
R Cheema
07/10/2020
Issue date

Hand in deadline

You work for a start-up company called Money Run who are
developing internet based financial transfer software which
allows people to transfer money quickly and cheaply to
friends and family both at home and abroad.

The director of the company is well aware that such a


system would be the target for cyber criminals and has
read in news reports that the Office for National Statistics
reported that there were 2.5 million cyber crime offences in
Vocational Scenario or 2015.
Context
She is also aware that you recently completed a BTEC
course which included a unit in IT security so she has asked
you to investigate and report on current security threats to
their web site and software.

He has also asked you to investigate encryption methods


and how these could be used to keep their web site and
software secure.

Task 1
Write a report in which you:

● explain the current IT security threats to which organisations


are exposed
● explain the principles of information security that
organisations must be aware of and the reasons why legal
requirements must be adhered to when considering IT
security
● assess the impact that IT security threats could have on an
organisations’ IT systems and their business
● evaluate the effectiveness of the techniques used by
organisations to protect their computer systems from
security threats. Your evaluation should take into account the
principles of information security and the relevant legal
requirements.
● explain the principles behind cryptography
● explain the ways in which cryptography can be used to
secure and protect the financial data that the company will
need to store and transfer over the internet
● analyse the impact that cryptography will have on the
security and protection of data that the company needs to
store and transfer.

Checklist of evidence A report, either written or electronic, such as a blog


required
Criteria covered by this task:
Unit/Criteria
To achieve the criteria you must show that you are able to:
reference
Evaluate the effectiveness of the techniques used to protect organisations from
7/AB.D1
security threats whilst taking account of the principles of information security and
legal requirements.
Assess the impact that IT security threats can have on organisations’ IT systems
7/A.M1
and business whilst taking account of the principles of information security and
legal requirements.
7/B.M2 Analyse how the principles and uses of cryptography impact on the security and
protection of data.
7/A.P1 Explain the different security threats that can affect the IT systems of
organisations.
7/A.P2 Explain the principles of information security when protecting the IT systems of
organisations.
7/A.P3 Explain why organisations must adhere to legal requirements when considering
IT system security.
7/B.P4
Explain the principles and uses of cryptography to secure and protect data.
Sources of information ● BBC News Technology section – technology news, including cases of
to support you with significant cyber-attacks: www.bbc.co.uk/news/technology
this Assignment
● McAfee’ssecurity advice centre – provides useful and up-to-date
information on security, virus attacks and viruses, written in a

2
BTEC Assignment Brief v1.0
BTEC Internal Assessment QDAM January 2015
reasonably accessible manner: home.mcafee.com/advicecenter/

● Microsoft's
security advice centre – features a regularly updated blog
and FAQ on security issues: www.microsoft.com/security/

● Norton’ssecurity centre – provides articles on security, spam email,


software piracy, etc.: uk.norton.com/security-center/

Other assessment eg, work sheets, risk assessments, case study


materials attached to
this Assignment Brief

3
BTEC Assignment Brief v1.0
BTEC Internal Assessment QDAM January 2015

You might also like