[Year 12 IT Apps] Security measures

Antonia Caridi ACaridi at sac.vic.edu.au
Wed Sep 12 10:14:28 EST 2007


Having written U4 O2 in the Study Design and both on VITTA CD my understanding is that students need to know as much about storage, communication & disposal of data as they have in the past as this task is almost identical to U3 O3 of the last study design.

I don't think that students need to know detailed technical information about security hardware and software but they must have understanding/awareness of 

the four main privacy acts - their gist and what laws organisations, governments, other are bound by
ethical considerations of technology in the workplace
common hardware that is used to protect data
common software (logical tools) that are used to protect data
strategies that can be implemented to minimise threats to data including storage procedures 
disaster recovery strategies
evaluation of security strategies

I agree that the Potts text has a lot of info about surveillance technology but I don't think that students would be expected to know this much detail - however they should be expected to know that such technology exists.

I think knowledge of back up media, and commonly used physical and logical security measures is essential.

I think Potts text has good info on disaster recovery.

I also think that questions on these topics from past papers will be useful in determining the extent of knowledge required because the key knowledge of the past U3 O3 are:

the legal obligations of organisations and individuals to monitor and control the flow and access of information, including key provisions of several acts
ethical considerations relating to the use of information systems by organisations and individuals
threats to the security of data and information stored, communicated and disposed of by organisations * viruses, unauthorised access, tampering with files, failure to follow file management procedures (deliberate or accidental), equipment failure/damage
possible consequences of the violation of or failure to follow security measures (equipment and procedures)
procedures and equipment for protecting the integrity of data and the security of information
types, roles and functions of equipment used to assist in the protection of files produced and received by organisations * virus protection software, encryption software, biometrics, backup media, firewalls, surveillance technology to protect the security of information
criteria for evaluating the effectiveness of file management strategies * integrity of data, security, ease of retrieval, currency of files


Please let everyone know if I am wrong Paula!!

Antonia


Antonia Caridi
Sacre Coeur
172 Burke Road
Glen Iris 3146
(03) 9885 4501

èµ__________________________________________________________________________________
This email and any attachments may be confidential and, if you are not the intended recipient you must not disclose or use the information in this email. If received in error, please notify the sender immediately and delete the email and all copies. The school does not guarantee that this email is virus or error free. Any attached files are provided and may only be used on the basis that the recipient assumes all responsibility for any loss, damage or consequence resulting directly or indirectly from the use of this email and/or attached files, whether caused by the negligence of the sender or not. The content and opinions in this email are not necessarily those of Sacre Coeur. 
____________________________________________________________________________________



More information about the itapps mailing list