OCR Level 2 CAMBRIDGE TECHNICAL

Size: px
Start display at page:

Download "OCR Level 2 CAMBRIDGE TECHNICAL"

Transcription

1 Cambridge TECHNICALS OCR Level 2 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT IT security J/601/4057 LEVEL 2 UNIT 18 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10

2 IT SECURITY J/601/4057 LEVEL 2 Aim and purpose of the unit This unit will enable learners to recognise the threats to systems security and to know how to protect their systems from damage. It will also provide them with an understanding of the legal responsibilities that IT practitioners have when working with information systems. On completing this unit learners will be able to identify a range of threats to the security of IT systems and be able to identify which threats are most relevant to systems with which they work. Learners will also be able to identify a range of security methods available for IT systems and select the most appropriate methods for their own systems. They will identify any legal constraints on how they use information systems and the data which is held on them. The user will be able to develop a simple security plan and implement and test it to ensure that the systems are protected against relevant threats and design and use the correct documentation. 2

3 IT security Level 2 Unit 18 ASSESSMENT AND GRADING CRITERIA Learning Outcome (LO) Pass Merit Distinction The learner will: The assessment criteria are the pass requirements for this unit. The learner can: To achieve a merit the evidence must show that, in addition to the pass criteria, the learner is able to: To achieve a distinction the evidence must show that, in addition to the pass and merit criteria, the learner is able to: 1 Know the potential threats to the security of IT systems 2 Understand how to protect IT systems 3 Be able to apply security measures P1 identify the potential threats to the security of IT systems P2 outline the legislation that requires an organisation to protect its IT systems and data P3 discuss security methods for protecting IT systems and data P4 create a security plan for a small office or home network P5 implement a security plan P6 test a security plan M1 explain relevant security methods used for an identified system M2 create documentation to record outcomes of the implementation of the security plan M3 review test results against the predicted results of the security plan D1 justify why security methods for an identified system are effective D2 make improvements to the security plan, revising associated documentation 3

4 Teaching content The unit content describes what has to be taught to ensure that learners are able to access the highest grade. Anything which follows an i.e, details what must be taught as part of that area of content. Anything which follows an e.g, is illustrative. It should be noted that where e.g. is used, learners must know, and be able to apply, relevant examples to their work though these do not need to be the same ones specified in the unit content. LO1 Know the potential threats to the security of IT systems security threats software (e.g. poor design or poor coding, programmers leaving trapdoors allowing access without going through all the security checks, missing security patches) hacking (e.g. internal by employees, external by criminals, foreign agencies, terrorists) Phishing (e.g. or telephone or face-to-face contact seeking information such as usernames and passwords, pin numbers) Viruses (e.g. boot sector, browser hijacker, Direct Action (Vienna), file infector, macro, polymorphic) Worms (e.g. , internet, instant messaging, file sharing) spyware (e.g. adware,.url loggers, screen recorders, chat loggers, loggers) theft of software and/or hardware accidental damage (e.g. power surges, spillage of liquids on machinery, accidental erasure of data, breakage of hardware) intentional damage (e.g. destruction of data using either physical or software means, arson, water damage) environmental hazards (e.g. flood, earthquake, hurricane, fire) unauthorised access. LO2 Understand how to protect IT systems EU Directives EU Data Protection Directive (Directive 95/46/EC) UK Law (current legislative requirements) Computer Misuse Act Data Protection Act Copyright, Design and Patents Act Health and Safety (Display Screen Equipment) Regulations. security methods hardware policies and procedures for physical access controls (e.g. fingerprint, iris recognition, keypads, locks, machine specific access) password protection on hard discs, CDs, DVDs, flash drives security locks on machines to prevent theft policies and procedures on eating or drinking near equipment fire fighting equipment to be used near computing equipment. software and data policies and procedures (e.g. password and authentication control, software access controls, backup and retention) access levels and controls (e.g. setting of passwords, password strength, password life, usernames) encryption network policies and procedures on network security (e.g. firewalls, patch registers, anti-virus software), right to amend or update the network or its components including hardware and software policies and procedures on access rights to particular software or data on the system policies and procedures on the attachment of hardware to the network (e.g. disabling CD drives or flash drives) policies and procedures on external access to the network via mobile technology (e.g. smartphones, tablets). LO3 Be able to apply security measures security policy computer configuration conduct of employees risk management importance of information no restrictions and no threats (e.g. public information) confidential (e.g. HR records of individual staff, 4

5 IT security Level 2 Unit 18 customer details, discount policies) critical to the success of the business or its reputation, product formulae, designs for new products user management training accountability (e.g. responsibilities and limitations to authority) access to expert IT support system management access control (e.g. finger print, iris recognition, keypads) backups (e.g. locations, times, recovery) data encryption data integrity (e.g. user authorisation, authentication) software integrity (e.g. legal software, regular updating). security plan structure layout (e.g. organisation, types of staff activity, name of creator, date of creation, version number and revision date, contents page) sections (e.g. introduction, objectives, current security, security priorities, system description, management controls, operational controls, technical controls, predicted outcomes of tests) development of risk assessments to ensure that the correct level of risk is identified for the value of the assets e.g there is no point in spending many thousands of pounds on protecting home networks used only for entertainment, sending s and chatting on social networks. testing the security plan denial of service attack weak passwords used backups up to date and covering agreed data software patches installed status of anti-virus software external access appropriate. forms and documents list of physical security to be put in place list of naming conventions (e.g. group profiles, user profiles, authorisation lists) list of devices list of system responsibilities user group identification documentation user group description documentation individual user documentation. implement the security plan timetable of activities guidance for users and managers implement physical security implement software and data security implement network security complete forms and documents confirming implementation. 5

6 Delivery guidance To deliver this unit, the tutor may choose to follow the order of the teaching content but this is not essential. It is important that the focus is on ensuring that learners have the opportunity not only to acquire the necessary knowledge but also have the opportunity to practice and achieve the level and range of skills listed in the assessment criteria. Know the potential threats to the security of IT Learners need to know what threats they face; the tutor should encourage learners to consider what security they have on their own computers, mobile telephones or pen drives and discuss whether they are safe from attack or not, using this to build towards a discussion of organisations on one site and many sites. Learners should undertake desk based research looking for examples of threats, the damage caused to systems and reputations and how they have been dealt with by organisations or the legal system. Learners could be asked to work on these elements in groups and make a presentation to colleagues on what they have found or produce a range of information sheets for dissemination to the wider group. There will be overlaps but there will also be different approaches and information. A class discussion could then take place where the strengths and weaknesses of all the information can be discussed and an agreed interpretation of the range of potential threats identified. Guest speakers, possibly drawn from the school or college IT technicians, talking about their knowledge and experience of facing the results of security threats and how they dealt with them, would provide learners with the opportunity to consider security within a system with which they are familiar. Other possible options are for learners to work for short periods on placement or shadowing technicians. If learners have access to a training IT laboratory or workshop then they could work in teams to identify threats. Understand how to protect IT systems Learners could use the results of their research on and experience of, security threats already carried out, as an introduction to discussions on the legal implications of storing data and software on a computer system. Learners must understand the range of laws which are available to help combat illegal activity and also what legal obligations are placed upon the system users in terms of protecting personal information belonging to living people. Again, research activities could be introduced using group work to investigate examples of when the laws have been called on to deal with breaches, or to investigate the particular elements of the Acts. Learners should be discouraged from merely quoting the Acts. It is more useful if learners are encouraged to describe the purpose in their own words together with how these laws support IT security and the responsibilities they put on individuals and organisations. Groups of learners could produce flip charts or presentations on their interpretation which can be discussed by the wider group to come to an accurate consensus on the correct explanation. Learners must understand and be able to apply a range of security measures including security policies and risk management procedures by investigating examples from: the college or school, internet, presentations by invited speakers. These findings can be discussed in a class situation to clarify any areas of confusion and to correct any issues. Using this knowledge, learners must be able to design policies and procedures to protect and reduce risk for identified types of home or small business information system. Invited speakers who have a role in designing or implementing security measures would provide a useful source of information on the realities of developing and using security measures. Learners need to study a range of security measures and consider the cost of purchasing, maintaining and updating such measures (precise costs are not required but learners must appreciate that all security has a cost and therefore, it is important to select the appropriate security measure for the particular IT system and its components). Be able to apply security methods Learners need to know what their security plan should include in order to protect the system and employees from attack and to recognise that attack may be intentional, accidental, internal or external to the organisation. All of these issues may occur even in home or small offices but the type of work activities and information and data stored will decide on how complex the security plan needs to be. When learners have completed an outline security plan from their own research and knowledge of IT security in relation to an identified information system, they could then be provided with a copy of a security plan which may be downloaded from the internet, or a copy of the security plan. Learners in the workplace may have access to their organisation s security plan. It is helpful if they have access to at least a small sample of 6

7 IT security Level 2 Unit 18 plans so that they can compare and analyse the different approaches. Class discussions, invited speakers with a background in IT Security would be helpful and the IT staff of the school or college may be willing to take this on. Learners could work individually, or in groups, on reviewing the different approaches and then sharing their experience with the rest of the class to provide an example of real world security measures and which ones would be most relevant to home or small business. For implementation, it is necessary for the learner to have access to a system and to play the part of the tester by setting a test scenario and predicted outcomes and observing how it performs when another learner, for example, carries out the plan. It would be useful for the learners to use the learning undertaken to identify potential threats for LO1 and use these as the base for the test. This should normally be undertaken on a stand-alone computer or on a local network with the permission of the systems administrator. All learners can practice being the tester and also observe their own tests being undertaken. The opinions of observers and those taking part can then be discussed to extract good practice and areas which did not work well in designing and implementing a security plan. 7

8 Suggested assessment scenarios and task plus guidance on assessing the suggested tasks The assessment could be set as a single long assignment being built up over the period of the unit or it could be split into individual tasks. If the former case is undertaken then formative assessment on completion of key elements such as the completion of the plan, would be required. Although learners may undertake group work while developing the knowledge and skills all work submitted for assessment must be carried out individually by the learner. Assessment Criterion P1 Learners must identify a range (three or more) of potential threats to the security of IT systems. The evidence could take the form of a leaflet, report or presentation. If the evidence is a presentation, detailed speaker notes must be included or an audio/visual recording of the presentation must be provided. Assessment Criterion P2 Learners must outline relevant legislation, both national and EU, which is relevant to the protection of IT systems. They could create leaflets, a presentation or report on relevant legislation and what requirements it places upon the business. If a presentation is created, it must be accompanied by speaker notes which provide the required detail. Assessment Criteria P3, M1, D1 Learners must discuss the security methods available for protecting: hardware software data network. For merit criterion, M1 learners must explain the security methods which are most relevant to a particular system and could produce a report or presentation on the methods they have identified and the reasons why learners believes them to be the most appropriate. If a presentation is produced then learners must provide speaker notes which provide the necessary level of detail, or video evidence. For distinction criterion, D1 learners must justify, using the evidence from M1, why the security methods for the identified system are effective. The evidence may take the form of a report or presentation but the presentation would need to be accompanied by very detailed speaker s notes. Please note that P4, P5, P6, M2, M3 and D2 could be carried out by learners in one longitudinal assessment from creation of the plan to the testing and adjustments. Clearly this will depend upon the quality of the individual assessment activities and evidence. Assessment Criterion P4 Learners must create a security plan, drawing on their findings from assessment criteria P2 and P3, where appropriate. It must include the following security elements: hardware software data network. Each learner must create a plan. The plan must include the predicted outcomes of the tests and should include, or be accompanied by, additional explanation and clarification as to the choices made; this could take the form of a report or presentation with speaker notes, or video evidence. Assessment Criteria P5 and M2 Learners must implement a security plan, which may be the one created for P4 or one from another source and complete the necessary documentation as they go through the implementation process. A detailed observation report could be presented or video recording of the process could be offered as evidence of the implementation. For merit criterion M2, learners must create the necessary documentation for recording the outcome of implementing the plan. These documents must be original and not existing templates or exemplars from the internet. The documents should contain notes and guidance so that the user will have the necessary knowledge to complete them accurately. The documents may be paper-based or electronic and the guidance could be delivered as a video tutorial. Assessment Criteria P6, M3, D2 Learners must test the security plan used in P5. This must include the test plan confirming the intended and actual results of the tests carried out, as well as any associated documentation, printouts, forms used. This could be further supported by annotated screenshots or reports. 8

9 IT security Level 2 Unit 18 For merit criterion M3, learners must provide evidence of reviewing the actual test results against the predicted results and explain what the results mean, whether there are any issues identified. This could be evidenced through including an additional section within the original test plan or producing a report. For distinction criterion D2, learners must make improvements to the security plan and any associated documentation based on their review of the test results from M3. Evidence must be the revised security plan and associated documentation, which may be the original plan and documentation with annotations. Resources: Learners must have access to an information system for which they can develop and test a security plan. 9

10 10

11 IT security Level 2 Unit 18 Mapping within the qualification to the other units Unit 1 Communicating in the IT industry Unit 4 Installing computer hardware Unit 5 Installing computer software Unit 6 Setting up an IT network Unit 12 Presenting information using IT Links to NOS 6.2 IT Security Management 6.3 IT Disaster Recovery 11

12 CONTACT US Staff at the OCR Customer Contact Centre are available to take your call between 8am and 5.30pm, Monday to Friday. We re always delighted to answer questions and give advice. Telephone

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT ORGANISATIONAL SYSTEMS SECURITY T/601/7312 LEVEL 3 UNIT 5 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 ORGANISATIONAL SYSTEMS

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT NETWORKED SYSTEMS SECURITY J/601/7332 LEVEL 3 UNIT 28 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 NETWORKED SYSTEMS SECURITY

More information

How To Understand The Benefits Of An Online Business

How To Understand The Benefits Of An Online Business Cambridge TECHNICALS OCR LEVEL 2 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT DOING BUSINESS ONLINE Y/601/5083 LEVEL 2 UNIT 21 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 DOING BUSINESS ONLINE Y/601/5083

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT WEB SERVER SCRIPTING A/601/0443 LEVEL 3 UNIT 26 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 WEB SERVER SCRIPTING A/601/0443

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT IT TECHNICAL SUPPORT J/601/7279 LEVEL 3 UNIT 8 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 IT TECHNICAL SUPPORT J/601/7279

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT SYSTEM DESIGN R/505/4647 LEVEL 3 UNIT 33 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 SYSTEM DESIGN R/505/4647 LEVEL 3

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT INFORMATION SYSTEMS H/601/7256 LEVEL 3 UNIT 2 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 INFORMATION SYSTEMS H/601/7256

More information

OCR LEVEL 2 CAMBRIDGE TECHNICAL

OCR LEVEL 2 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 2 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT DATABASE SYSTEMS R/601/3400 LEVEL 2 UNIT 20 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 DATABASE SYSTEMS R/601/3400 LEVEL

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT COMPUTER NETWORKS R/601/7320 LEVEL 3 UNIT 7 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 COMPUTER NETWORKS R/601/7320 LEVEL

More information

OCR LEVEL 2 CAMBRIDGE TECHNICAL

OCR LEVEL 2 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 2 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT IT SUPPORT F/601/3277 LEVEL 2 UNIT 7 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 IT SUPPORT F/601/3277 LEVEL 2 AIM OF

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT DATABASE DESIGN J/601/6617 LEVEL 3 UNIT 23 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 DATABASE DESIGN J/601/6617 LEVEL

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT UNDERSTANDING THE BUSINESS ANALYTICS PROCESS FOR BIG DATA J/505/5326 LEVEL 3 UNIT 39 GUIDED LEARNING HOURS: 60 UNIT CREDIT

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT EXPLORING COMPUTER APPLICATIONS M/505/5403 LEVEL 3 UNIT 36 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 EXPLORING COMPUTER

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT WEBSITE PRODUCTION Y/601/6623 LEVEL 3 UNIT 12 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 WEBSITE PRODUCTION Y/601/6623

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT WEB ANIMATION FOR INTERACTIVE MEDIA A/502/5661 LEVEL 3 UNIT 18 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 WEB ANIMATION

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT e-commerce A/601/7313 LEVEL 3 UNIT 6 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 e-commerce A/601/7313 LEVEL 3 UNIT 6

More information

OCR LEVEL 2 CAMBRIDGE TECHNICAL

OCR LEVEL 2 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 2 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT COMPUTER GRAPHICS H/601/5801 LEVEL 2 UNIT 10 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 COMPUTER GRAPHICS H/601/5801

More information

OCR LEVEL 2 CAMBRIDGE TECHNICAL

OCR LEVEL 2 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 2 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT SYSTEMS SOFTWARE AND HARDWARE FOR DEVELOPMENT D/505/4621 LEVEL 2 UNIT 25 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 Systems

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT UNDERSTANDING SOCIAL MEDIA FOR BUSINESS T/505/5399 LEVEL 3 UNIT 43 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 Oxford

More information

BUSINESS OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS WEBSITE DESIGN STRATEGY CERTIFICATE/DIPLOMA IN Y/502/5490 LEVEL 3 UNIT 19

BUSINESS OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS WEBSITE DESIGN STRATEGY CERTIFICATE/DIPLOMA IN Y/502/5490 LEVEL 3 UNIT 19 Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN BUSINESS WEBSITE DESIGN STRATEGY Y/502/5490 LEVEL 3 UNIT 19 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 WEBSITE DESIGN STRATEGY

More information

OCR LEVEL 2 CAMBRIDGE TECHNICAL

OCR LEVEL 2 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 2 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT WEBSITE DEVELOPMENT A/601/3245 LEVEL 2 UNIT 9 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 WEBSITE DEVELOPMENT A/601/3245

More information

OCR LEVEL 2 CAMBRIDGE TECHNICAL

OCR LEVEL 2 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 2 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT UNDERSTANDING CLOUD COMPUTING L/505/5652 LEVEL 2 UNIT 30 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 Understanding cloud

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT PROJECT PLANNING WITH IT Y/601/7321 LEVEL 3 UNIT 9 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 PROJECT PLANNING WITH IT

More information

BUSINESS OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS INTERNET MARKETING IN BUSINESS CERTIFICATE/DIPLOMA IN M/502/5432 LEVEL 3 UNIT 11

BUSINESS OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS INTERNET MARKETING IN BUSINESS CERTIFICATE/DIPLOMA IN M/502/5432 LEVEL 3 UNIT 11 Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN BUSINESS INTERNET MARKETING IN BUSINESS M/502/5432 LEVEL 3 UNIT 11 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 INTERNET MARKETING

More information

OCR CAMBRIDGE LEVEL 2

OCR CAMBRIDGE LEVEL 2 Cambridge T E C OCR CAMBRIDGE LEVEL 2 CERTIFICATE/DIPLOMA IT BUSINESS IT SKILLS T/601/5012 LEVEL 2 UNIT 3 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 BUSINESS IT SKILLS T/601/5012 LEVEL 2 AIM OF THE

More information

BUSINESS OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS ASPECTS OF CONTRACT AND BUSINESS LAW CERTIFICATE/DIPLOMA IN F/502/5452 LEVEL 3 UNIT 16

BUSINESS OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS ASPECTS OF CONTRACT AND BUSINESS LAW CERTIFICATE/DIPLOMA IN F/502/5452 LEVEL 3 UNIT 16 Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN BUSINESS ASPECTS OF CONTRACT AND BUSINESS LAW F/502/5452 LEVEL 3 UNIT 16 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 ASPECTS

More information

OCR LEVEL 2 CAMBRIDGE TECHNICAL

OCR LEVEL 2 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 2 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT UNDERSTANDING BIG DATA K/505/5383 LEVEL 2 UNIT 29 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 Understanding Big Data K/505/5383

More information

Unit 3 Cyber security

Unit 3 Cyber security 2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 3 Cyber security Y/507/5001 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 3: Cyber security Y/507/5001 Guided learning hours:

More information

Principles of ICT Systems and Data Security

Principles of ICT Systems and Data Security Unit 14: Principles of ICT Systems and Data Security Unit code: L/601/3508 QCF Level 2: BTEC Specialist Credit value: 6 Guided learning hours: 45 Aim and purpose This unit introduces the common types of

More information

NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0

NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0 NOS for IT User and Application Specialist IT Security (ESKITU04) November 2014 V1.0 NOS Reference ESKITU040 ESKITU041 ESKITU042 Level 3 not defined Use digital systems NOS Title Set up and use security

More information

BUSINESS OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS INTERNATIONAL BUSINESS CERTIFICATE/DIPLOMA IN F/502/5502 LEVEL 3 UNIT 22

BUSINESS OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS INTERNATIONAL BUSINESS CERTIFICATE/DIPLOMA IN F/502/5502 LEVEL 3 UNIT 22 Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN BUSINESS INTERNATIONAL BUSINESS F/502/5502 LEVEL 3 UNIT 22 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 INTERNATIONAL BUSINESS

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT CLOUD COMPUTING IN BUSINESS M/505/5384 LEVEL 3 UNIT 40 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 CLOUD COMPUTING IN

More information

Organisational Systems Security

Organisational Systems Security Unit 7: Organisational Systems Security Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 60 Aim and purpose T/601/7312 BTEC Nationals The aim of this unit is to enable learners to understand

More information

BUSINESS OCR LEVEL 2 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS VERBAL AND NON-VERBAL COMMUNICATION IN BUSINESS CONTEXTS CERTIFICATE/DIPLOMA IN

BUSINESS OCR LEVEL 2 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS VERBAL AND NON-VERBAL COMMUNICATION IN BUSINESS CONTEXTS CERTIFICATE/DIPLOMA IN Cambridge TECHNICALS OCR LEVEL 2 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN BUSINESS VERBAL AND NON-VERBAL COMMUNICATION IN BUSINESS CONTEXTS M/502/5303 LEVEL 2 UNIT 6 GUIDED LEARNING HOURS: 30 UNIT CREDIT

More information

Networked Systems Security

Networked Systems Security Unit 32: Networked Systems Security Unit code: QCF Level 3: Credit value: 10 Guided learning hours: 60 Aim and purpose J/601/7332 BTEC National The aim of this unit is to ensure learners know about the

More information

Unit 21 Web design and prototyping

Unit 21 Web design and prototyping 2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 21 Web design and prototyping A/507/5024 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 21: Web design and prototyping A/507/5024

More information

An Approach to Records Management Audit

An Approach to Records Management Audit An Approach to Records Management Audit DOCUMENT CONTROL Reference Number Version 1.0 Amendments Document objectives: Guidance to help establish Records Management audits Date of Issue 7 May 2007 INTRODUCTION

More information

MEDIA OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS PLANNING FOR MEDIA EXHIBITIONS OR EVENTS CERTIFICATE/DIPLOMA IN K/504/0513 LEVEL 3 UNIT 23

MEDIA OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS PLANNING FOR MEDIA EXHIBITIONS OR EVENTS CERTIFICATE/DIPLOMA IN K/504/0513 LEVEL 3 UNIT 23 Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN MEDIA PLANNING FOR MEDIA EXHIBITIONS OR EVENTS K/504/0513 LEVEL 3 UNIT 23 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 PLANNING

More information

MEDIA OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS WEB AUTHORING AND DESIGN CERTIFICATE/DIPLOMA IN L/504/0519 LEVEL 3 UNIT 34

MEDIA OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS WEB AUTHORING AND DESIGN CERTIFICATE/DIPLOMA IN L/504/0519 LEVEL 3 UNIT 34 Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN MEDIA WEB AUTHORING AND DESIGN L/504/0519 LEVEL 3 UNIT 34 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 WEB AUTHORING AND DESIGN

More information

BUSINESS OCR LEVEL 2 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS TRAINING AND EMPLOYMENT IN BUSINESS CERTIFICATE/DIPLOMA IN H/502/5315 LEVEL 2 UNIT 8

BUSINESS OCR LEVEL 2 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS TRAINING AND EMPLOYMENT IN BUSINESS CERTIFICATE/DIPLOMA IN H/502/5315 LEVEL 2 UNIT 8 Cambridge TECHNICALS OCR LEVEL 2 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN BUSINESS TRAINING AND EMPLOYMENT IN BUSINESS H/502/5315 LEVEL 2 UNIT 8 GUIDED LEARNING HOURS: 30 UNIT CREDIT VALUE: 5 TRAINING

More information

BUSINESS OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS HUMAN RESOURCE MANAGEMENT IN BUSINESS CERTIFICATE/DIPLOMA IN K/502/5445 LEVEL 3 UNIT 5

BUSINESS OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS HUMAN RESOURCE MANAGEMENT IN BUSINESS CERTIFICATE/DIPLOMA IN K/502/5445 LEVEL 3 UNIT 5 Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN BUSINESS HUMAN RESOURCE MANAGEMENT IN BUSINESS K/502/5445 LEVEL 3 UNIT 5 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 HUMAN

More information

Level 3 Cambridge Technical in IT 05839/ 05840/ 05841/ 05842 Unit 3 Cyber security. Date Morning/Afternoon Time Allowed: 1 hour

Level 3 Cambridge Technical in IT 05839/ 05840/ 05841/ 05842 Unit 3 Cyber security. Date Morning/Afternoon Time Allowed: 1 hour SAMPLE ASSESSMENT MATERIAL Level 3 Cambridge Technical in IT 05839/ 05840/ 05841/ 05842 Unit 3 Cyber security Date Morning/Afternoon Time Allowed: 1 hour You must have: The Insert (clean copy case study)

More information

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details:

Contact details For contacting ENISA or for general enquiries on information security awareness matters, please use the following details: Malicious software About ENISA The European Network and Information Security Agency (ENISA) is an EU agency created to advance the functioning of the internal market. ENISA is a centre of excellence for

More information

BUSINESS OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS BUSINESS PROJECT MANAGEMENT CERTIFICATE/DIPLOMA IN K/502/5459 LEVEL 3 UNIT 18

BUSINESS OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS BUSINESS PROJECT MANAGEMENT CERTIFICATE/DIPLOMA IN K/502/5459 LEVEL 3 UNIT 18 Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN BUSINESS BUSINESS PROJECT MANAGEMENT K/502/5459 LEVEL 3 UNIT 18 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 BUSINESS PROJECT

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT DEVELOPING COMPUTER GAMES K/601/7324 LEVEL 3 UNIT 10 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 DEVELOPING COMPUTER GAMES

More information

How To Protect Decd Information From Harm

How To Protect Decd Information From Harm Policy ICT Security Please note this policy is mandatory and staff are required to adhere to the content Summary DECD is committed to ensuring its information is appropriately managed according to the

More information

Unit 22 Big Data analytics

Unit 22 Big Data analytics 2016 Suite Cambridge TECHNICALS LEVEL 3 IT Unit 22 Big Data analytics F/507/5025 Guided learning hours: 60 Version 1 September 2015 ocr.org.uk/it LEVEL 3 UNIT 22: Big Data analytics F/507/5025 Guided learning

More information

CP3043 Social, Legal and Professional Aspects of Computing. Mr Graham Brown. Assessment 2

CP3043 Social, Legal and Professional Aspects of Computing. Mr Graham Brown. Assessment 2 CP3043 Social, Legal and Professional Aspects of Computing Mr Graham Brown Assessment 2 Colin Hopson 0482647 Wednesday 16 th April 2008 i Contents 1 Introduction... 1 1.1 The Bridgeway Building Society...

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT COMPUTER ANIMATION D/601/7658 LEVEL 3 UNIT 14 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 COMPUTER ANIMATION D/601/7658

More information

How To Be A 3D Modelled Environment Artist

How To Be A 3D Modelled Environment Artist Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN MEDIA 3D MODELLED ENVIRONMENTS FOR GAMES AND ANIMATION L/504/0469 LEVEL 3 UNIT 62 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE:

More information

HEALTH AND SOCIAL CARE

HEALTH AND SOCIAL CARE Cambridge TECHNICALS OCR LEVEL 2 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN HEALTH AND SOCIAL CARE CREATIVE AND THERAPEUTIC ACTIVITIES IN HEALTH AND SOCIAL CARE D/600/6885 LEVEL 2 UNIT 9 GUIDED LEARNING

More information

MEDIA OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS ANIMATION PRODUCTION CERTIFICATE/DIPLOMA IN K/504/0480 LEVEL 3 UNIT 66

MEDIA OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS ANIMATION PRODUCTION CERTIFICATE/DIPLOMA IN K/504/0480 LEVEL 3 UNIT 66 Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN MEDIA ANIMATION PRODUCTION K/504/0480 LEVEL 3 UNIT 66 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 ANIMATION PRODUCTION K/504/0480

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Policy Reference Number Title CSD-003 Information Security Policy Version Number 3.0 Document Status Document Classification Active Open Effective Date 01 October

More information

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0 BCS IT User Syllabus IT for Users Level 2 Version 1.0 June 2009 ITS2.1 System Performance ITS2.1.1 Unwanted messages ITS2.1.2 Malicious ITS2.1.1.1 ITS2.1.1.2 ITS2.1.2.1 ITS2.1.2.2 ITS2.1.2.3 ITS2.1.2.4

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT COMPUTER GAME PLATFORMS AND TECHNOLOGIES L/600/6610 LEVEL 3 UNIT 15 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 COMPUTER

More information

Information Security

Information Security Information Security A staff guide to the University's Information Systems Security Policy Issued by the IT Security Group on behalf of the University. Information Systems Security Guidelines for Staff

More information

Service Children s Education

Service Children s Education Service Children s Education Data Handling and Security Information Security Audit Issued January 2009 2009 - An Agency of the Ministry of Defence Information Security Audit 2 Information handling and

More information

ART AND DESIGN OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS USING DIGITAL TECHNOLOGY IN GRAPHIC DESIGN CERTIFICATE/DIPLOMA IN T/504/0272

ART AND DESIGN OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS USING DIGITAL TECHNOLOGY IN GRAPHIC DESIGN CERTIFICATE/DIPLOMA IN T/504/0272 Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN ART AND DESIGN USING DIGITAL TECHNOLOGY IN GRAPHIC DESIGN T/504/0272 LEVEL 3 UNIT 30 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE:

More information

NHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction

NHSnet SyOP 9.2 NHSnet Portable Security Policy V1. NHSnet : PORTABLE COMPUTER SECURITY POLICY. 9.2 Introduction NHSnet : PORTABLE COMPUTER SECURITY POLICY 9.2 Introduction This document comprises the IT Security policy for Portable Computer systems as described below. For the sake of this document Portable Computers

More information

Data Stored on a Windows Computer Connected to a Network

Data Stored on a Windows Computer Connected to a Network Attachment A Form to Describe Sensitive Data Security Plan For the Use of Sensitive Data from The National Longitudinal Study of Adolescent to Adult Health Data Stored on a Windows Computer Connected to

More information

Information Security Baseline (minimal measures)

Information Security Baseline (minimal measures) Information Security Baseline (minimal measures) 1 Version management Version 0.1 9 September 2013 1st draft Version 0.2 23 September 2013 2nd draft after review by Erik Adriaens Version 0.3 8 October

More information

MEDIA OCR LEVEL 2 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS 2D GAMES DEVELOPMENT CERTIFICATE/DIPLOMA IN K/504/0852 LEVEL 2 UNIT 60

MEDIA OCR LEVEL 2 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS 2D GAMES DEVELOPMENT CERTIFICATE/DIPLOMA IN K/504/0852 LEVEL 2 UNIT 60 Cambridge TECHNICALS OCR LEVEL 2 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN MEDIA 2D GAMES DEVELOPMENT K/504/0852 LEVEL 2 UNIT 60 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 2D GAMES DEVELOPMENT K/504/0852

More information

National Cyber Security Month 2015: Daily Security Awareness Tips

National Cyber Security Month 2015: Daily Security Awareness Tips National Cyber Security Month 2015: Daily Security Awareness Tips October 1 New Threats Are Constantly Being Developed. Protect Your Home Computer and Personal Devices by Automatically Installing OS Updates.

More information

How To Protect School Data From Harm

How To Protect School Data From Harm 43: DATA SECURITY POLICY DATE OF POLICY: FEBRUARY 2013 STAFF RESPONSIBLE: HEAD/DEPUTY HEAD STATUS: STATUTORY LEGISLATION: THE DATA PROTECTION ACT 1998 REVIEWED BY GOVERNING BODY: FEBRUARY 2013 EDITED:

More information

Cyber Essentials Scheme

Cyber Essentials Scheme Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these

More information

MEDIA OCR LEVEL 2 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS PRINT MEDIA PRODUCTION CERTIFICATE/DIPLOMA IN T/504/0529 LEVEL 2 UNIT 30

MEDIA OCR LEVEL 2 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS PRINT MEDIA PRODUCTION CERTIFICATE/DIPLOMA IN T/504/0529 LEVEL 2 UNIT 30 Cambridge TECHNICALS OCR LEVEL 2 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN MEDIA PRINT MEDIA PRODUCTION T/504/0529 LEVEL 2 UNIT 30 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 PRINT MEDIA PRODUCTION

More information

Cyber and Data Security. Proposal form

Cyber and Data Security. Proposal form Cyber and Data Security Proposal form This proposal form must be completed and signed by a principal, director or a partner of the proposed insured. Cover and Quotation requirements Please indicate which

More information

Policy Document. Communications and Operation Management Policy

Policy Document. Communications and Operation Management Policy Policy Document Communications and Operation Management Policy [23/08/2011] Page 1 of 11 Document Control Organisation Redditch Borough Council Title Communications and Operation Management Policy Author

More information

BUSINESS OCR LEVEL 2 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS FINANCIAL FORECASTING FOR BUSINESS CERTIFICATE/DIPLOMA IN K/502/5252 LEVEL 2 UNIT 3

BUSINESS OCR LEVEL 2 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS FINANCIAL FORECASTING FOR BUSINESS CERTIFICATE/DIPLOMA IN K/502/5252 LEVEL 2 UNIT 3 Cambridge TECHNICALS OCR LEVEL 2 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN BUSINESS FINANCIAL FORECASTING FOR BUSINESS K/502/5252 LEVEL 2 UNIT 3 GUIDED LEARNING HOURS: 30 UNIT CREDIT VALUE: 5 FINANCIAL

More information

Harper Adams University College. Information Security Policy

Harper Adams University College. Information Security Policy Harper Adams University College Information Security Policy Introduction The University College recognises that information and information systems are valuable assets which play a major role in supporting

More information

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation

ICT SECURITY POLICY. Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation ICT SECURITY POLICY Strategic Aim To continue to develop and ensure effective leadership, governance and management throughout the organisation Responsibility Assistant Principal, Learner Services Jannette

More information

HEALTH AND SOCIAL CARE

HEALTH AND SOCIAL CARE Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN HEALTH AND SOCIAL CARE EQUALITY, DIVERSITY AND RIGHTS IN HEALTH AND SOCIAL CARE D/600/9222 LEVEL 3 UNIT 2 GUIDED LEARNING HOURS:

More information

University of Liverpool

University of Liverpool University of Liverpool Information Security Incident Response Policy Reference Number Title CSD-012 Information Security Incident Response Policy Version Number 1.2 Document Status Document Classification

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

A Guide to Information Technology Security in Trinity College Dublin

A Guide to Information Technology Security in Trinity College Dublin A Guide to Information Technology Security in Trinity College Dublin Produced by The IT Security Officer & Training and Publications 2003 Web Address: www.tcd.ie/itsecurity Email: ITSecurity@tcd.ie 1 2

More information

Small businesses: What you need to know about cyber security

Small businesses: What you need to know about cyber security Small businesses: What you need to know about cyber security March 2015 Contents page What you need to know about cyber security... 3 Why you need to know about cyber security... 4 Getting the basics right...

More information

Live Assessment Material Model Assignment 1

Live Assessment Material Model Assignment 1 Live Assessment Material Model Assignment 1 OCR Level 1/2 Cambridge National Award in Creative imedia OCR Level 1/2 Cambridge National Certificate in Creative imedia OCR Level 1/2 Cambridge National Diploma

More information

Working Practices for Protecting Electronic Information

Working Practices for Protecting Electronic Information Information Security Framework Working Practices for Protecting Electronic Information 1. Purpose The following pages provide more information about the minimum working practices which seek to ensure that

More information

Information Incident Management Policy

Information Incident Management Policy Information Incident Management Policy Change History Version Date Description 0.1 04/01/2013 Draft 0.2 26/02/2013 Replaced procedure details with broad principles 0.3 27/03/2013 Revised following audit

More information

NHS Business Services Authority Records Management Audit Framework

NHS Business Services Authority Records Management Audit Framework NHS Business Services Authority Records Management Audit Framework NHS Business Services Authority Corporate Secretariat NHSBSARM019 Issue Sheet Document Reference Document Location Title Author Issued

More information

Acceptable Use Policy

Acceptable Use Policy Sell your Products Online and Web by Numbers are brands of Web by Numbers Ltd (hereinafter referred to as Web by Numbers ) Acceptable Use Policy Web by Numbers has created this Acceptable Use Policy (AUP)

More information

Network Security Policy

Network Security Policy IGMT/15/036 Network Security Policy Date Approved: 24/02/15 Approved by: HSB Date of review: 20/02/16 Policy Ref: TSM.POL-07-12-0100 Issue: 2 Division/Department: Nottinghamshire Health Informatics Service

More information

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes

More information

COMHAIRLE NÁISIÚNTA NA NATIONAL COUNCIL FOR VOCATIONAL AWARDS. Consultative Draft Module Descriptor. Network Security.

COMHAIRLE NÁISIÚNTA NA NATIONAL COUNCIL FOR VOCATIONAL AWARDS. Consultative Draft Module Descriptor. Network Security. COMHAIRLE NÁISIÚNTA NA gcáilíochtaí GAIRMOIDEACHAIS NATIONAL COUNCIL FOR VOCATIONAL AWARDS Consultative Draft Module Descriptor Network Security Level 6 C30260 January 2006 1. Module Title Network Security

More information

SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0

SERVER, DESKTOP AND PORTABLE SECURITY. September 2014. Version 3.0 SERVER, DESKTOP AND PORTABLE SECURITY September 2014 Version 3.0 Western Health and Social Care Trust Page 1 of 6 Server, Desktop and Portable Policy Title SERVER, DESKTOP AND PORTABLE SECURITY POLICY

More information

Data Stored on a Windows Server Connected to a Network

Data Stored on a Windows Server Connected to a Network Attachment A Form to Describe Sensitive Data Security Plan For the Use of Sensitive Data from The National Longitudinal Study of Adolescent to Adult Health Data Stored on a Windows Server Connected to

More information

Associated Files: Managing resources. Expected Duration: 2 hours

Associated Files: Managing resources. Expected Duration: 2 hours Unit 2 Business Managing Instructions and answers for Teachers These instructions should accompany the OCR resource Managing, which supports the OCR Level 3 Cambridge Technical Certificate in Business

More information

Specimen Internal Assessment Material

Specimen Internal Assessment Material Model Assignment Specimen Internal Assessment Material OCR Level 1/2 Cambridge National Certificate in Science in the Workplace R076: Environmental science SPECIMEN INTERNAL ASESSMENT MATERIAL THIS VERSION

More information

STRONGER ONLINE SECURITY

STRONGER ONLINE SECURITY STRONGER ONLINE SECURITY Enhanced online banking without compromise Manage your business banking efficiently and securely Internet banking has given business leaders and treasurers greater control of financial

More information

FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12.

FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12. Competency: Defend and Attack (virus, spam, spyware, Trojans, hijackers, worms) 1. Identify basic security risks and issues to computer hardware, software, and data. 2. Define the various virus types and

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT COMPUTER GAME DESIGN H/502/5671 LEVEL 3 UNIT 32 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 COMPUTER GAME DESIGN H/502/5671

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

MEDIA OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS GRAPHIC DESIGN FOR MEDIA PRODUCTS CERTIFICATE/DIPLOMA IN F/504/0517 LEVEL 3 UNIT 32

MEDIA OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS GRAPHIC DESIGN FOR MEDIA PRODUCTS CERTIFICATE/DIPLOMA IN F/504/0517 LEVEL 3 UNIT 32 Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN MEDIA GRAPHIC DESIGN FOR MEDIA PRODUCTS F/504/0517 LEVEL 3 UNIT 32 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 GRAPHIC DESIGN

More information

Information Security By Bhupendra Ratha, Lecturer School of Library & Information Science D.A.V.V., Indore E-mail:bhu261@gmail.com Outline of Information Security Introduction Impact of information Need

More information

KEELE UNIVERSITY IT INFORMATION SECURITY POLICY

KEELE UNIVERSITY IT INFORMATION SECURITY POLICY Contents 1. Introduction 2. Objectives 3. Scope 4. Policy Statement 5. Legal and Contractual Requirements 6. Responsibilities 7. Policy Awareness and Disciplinary Procedures 8. Maintenance 9. Physical

More information

ART AND DESIGN OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS EXPLORING FILM-BASED PHOTOGRAPHY CERTIFICATE/DIPLOMA IN K504/0267 LEVEL 3 UNIT 21

ART AND DESIGN OCR LEVEL 3 CAMBRIDGE TECHNICAL. Cambridge TECHNICALS EXPLORING FILM-BASED PHOTOGRAPHY CERTIFICATE/DIPLOMA IN K504/0267 LEVEL 3 UNIT 21 Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN ART AND DESIGN EXPLORING FILM-BASED PHOTOGRAPHY K504/0267 LEVEL 3 UNIT 21 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 EXPLORING

More information

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy

BOARD OF DIRECTORS PAPER COVER SHEET. Meeting date: 22 February 2006. Title: Information Security Policy BOARD OF DIRECTORS PAPER COVER SHEET Meeting date: 22 February 2006 Agenda item:7 Title: Purpose: The Trust Board to approve the updated Summary: The Trust is required to have and update each year a policy

More information

Document Management Plan Preparation Guidelines

Document Management Plan Preparation Guidelines Document Management Plan Preparation Guidelines TABLE OF CONTENTS 1. Purpose of Document 1 2. Definition of Document Management 1 3. Objectives of Document Management 1 4. Terms, Acronyms and Abbreviations

More information

QUALIFICATION HANDBOOK

QUALIFICATION HANDBOOK QUALIFICATION HANDBOOK Level 2 Extended Certificate in Health Informatics (7450-12) February 2012 Version 1.0 Qualification at a glance Subject area City & Guilds number 7450 Health Informatics Age group

More information