Unit 12 – IT Technical Support – Anne Sewell Aims of the lesson: To carry out a back-up of files to a USB or desktop. This is a build-up exercise towards.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Web Shift Booking System
Data Transfer Data Import Data Export Database Backup and Restore Uninstalling and re-installing LIMS.
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Backup Strategy. An Exam question will ask you to describe a backup strategy. Be able to explain: Safe, secure place in different location. Why? – For.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
1 Enterprise Security Your Information Security and Privacy Responsibilities © 2008 Providence Health & Services This information may be replicated for.
Factors to be taken into account when designing ICT Security Policies
CPSC 203 Introduction to Computers Lab 21, 22 by Jie (Jeff) Gao Location: ES650.
Administration. Session Objective Become familiar with: – Managing a mobile phone based assessment – Managing Phones (c) Smap Consulting Pty Ltd2.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
C AMBRIDGE N ATIONALS - BP2 How Information and data can be stored on portable devices.
Administrative Practices Outcome 1
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Information guide.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
IT Security for Users By Matthew Moody.
1.1 System Performance Security Module 1 Version 5.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Security and backups GCSE ICT.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
 You always need to have the latest anti- virus software so that you can prevent picking up unwanted virus’.  To prevent receiving junk mail, being.
This is a presentation about viruses, Hacking and back ups!! By Alice Daniels 7P.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Project 2 Working on the Windows XP Desktop Windows XP Service Pack 2 Edition Comprehensive Concepts and Techniques.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
IT tools to communicate By Suleman Kalam. Podcast What is Podcasts? A podcasts is a downloadable media file which can be downloaded into many electronic.
CPSC 203 Introduction to Computers T43, T46 & T68 TA: Jie (Jeff) Gao.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
20/12/20151 Data Structures Backing up and Archiving Data.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
Administration. Session Objective Become familiar with: – Managing a mobile phone based assessment – Managing Phones (c) Smap Consulting Pty Ltd2.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Computer Security Sample security policy Dr Alexei Vernitski.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Scientific data storage: How are computers involved in the following?
ICT Laptops Passwords Encryption Back-ups Data Protection and the Internet Viruses Social Networking / Professional Conduct.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Unit 13 IT Systems Troubleshooting and Repair Anne Sewell
Administrative Practices Outcome 1
Business Risks of Insecure Networks
Security of Data  
G061 - Network Security.
Presentation transcript:

Unit 12 – IT Technical Support – Anne Sewell Aims of the lesson: To carry out a back-up of files to a USB or desktop. This is a build-up exercise towards M4 (Task 4), Assignment 4 – Advice and Guidance

For your assessment criteria you will need to do the following: “For M4, you should produce a ‘User’s Guide’ to solving common faults. The idea of this it will save you time having to respond to the same problem repeatedly. As a technician you would send a help or ‘crib’ sheet to a user to help them solve their problem (how to reset a password for example – does it need a capital letter or a combination of upper and lower case? Does it need a number?) Choose two faults and include appropriate screenshots and pictures. The material should be different from that provided for P5 but any style or format you wish to use is acceptable.  user guides Task 4 – Additional support M4 provide additional support material to users

Why back-up files? To provide “Data security”? Or the  Physical security, network security and security of computer systems What does “integrity” mean?  “the state of being whole, entire, or undiminished” – in other words your files are intact!

Data security is about keeping data safe. Many individuals, small businesses and major companies rely heavily on their computer systems. If the data on these computer systems is damaged, lost, or stolen, it can lead to disaster. Data Security

 up-files#1TC=windows-7 Backing up your files (“Administrator rights):

Key threats to data security Data may get:  lost or damaged during a system crash - especially one affecting the hard disk  corrupted as a result of faulty disks, disk drives, or power failures  lost by accidentally deleting or overwriting files  lost or become corrupted by computer viruses  hacked into by unauthorised users and deleted or altered  destroyed by natural disasters, acts of terrorism, or war deleted or altered by employees wishing to make money or take revenge on their employer Data Security

Measures that can be taken to keep data secure include:  making regular backups of files (backup copies should be stored in fireproof safes or in another building)  Using Cloud storage facilities  protecting yourself against viruses by running anti- virus software  using a system of passwords so that access to data is restricted  safe storage of important files stored on removable disks, eg locked away in a fireproof and waterproof safe  allowing only authorised staff into certain computer areas, eg by controlling entry to these areas by means of ID cards or magnetic swipe cards Keeping Data Secure

 always logging off or turning terminals off and if possible locking them  avoiding accidental deletion of files by write-protecting files/USB (flash sticks)/disks etc  using data encryption techniques to code data so that it makes no apparent sense! Keeping Data Secure

Online Banking When you bank online, look out for the http in the address bar has changed to https. This indicates that a secure connection between your computer/the bank's computer has been established. Data sent between the two computers is encrypted - anyone trying to intercept your data will receive meaningless data instead. The encrypted data can only be decrypted into readable data by using a key that is known only to the two computers - yours and the bank's. This is an example of a card reader: Other ways of keeping Data Secure

A padlock also ensures security:

Question  In a local doctor's surgery, data about the patients is stored in a database on a computer.  Can you name 2 physical precautions that should be taken to keep the data secure. Data Security

“Since USB flash drives are often used to store media files, which can be large, the smallest one should buy these days is 2GB. With technology improving rapidly, USB flash drive capacity is constantly increasing.” What Size USB Flash Drive Should You Buy? | eBay Should-You.../g.html The numbers game:

Answer  keep the computer area secure  keep backups in a safe place Hint: The key word is physical - the question is asking for the physical precautions you can take to protect data. Keeping the computer area secure and keeping backups in a safe place are both physical precautions. Swipe card entry, locking terminals or controlling access to computer areas would also have been good answers. Data Security

Question  The doctor needs to see all the information about patients. The receptionist only needs to see some of the information.  Describe one way in which software could restrict access to patient information. Data Security

Answer  Make it so users must enter a password to gain access to certain areas of the database. Hint: The question is looking for detail about different types of access for different users. This answer clearly highlights the need for having passwords for different levels of access. Data Security

Please take a handout and complete the 9 questions taken from the slides we have just looked at.  Add your name to the place at the top of the sheet  Total up your answers at the end Activity 1: Quiz

Please take a handout and complete the 9 questions taken from the slides we have just looked at.  Add your name to the place at the top of the sheet  Total up your answers at the end Activity 1: Quiz

Aims of the lesson:  You will need to provide evidence of this task by using annotated “before” and “after” screen dumps of backing up and restoring data. A screen print of backing up data from one drive to an external (USB) drive is acceptable.  In addition you will need to print off the results of your BBC questionnaire. Data Security

Click on the following link and watch the interactive video on data security and complete the test at the end:  ases/6datasecurityrev1.shtml ases/6datasecurityrev1.shtml Activity 2:Data Security (BBC)

Working in small groups use the laptops provided to backup the folder named “UNIT 12 BACKUP”. Use the USB provided to do this. Activity 3: Back-up using a USB

For your assessment criteria you will need to do the following: “For M4, you should produce a ‘User’s Guide’ to solving common faults. The idea of this it will save you time having to respond to the same problem repeatedly. As a technician you would send a help or ‘crib’ sheet to a user to help them solve their problem (how to reset a password for example – does it need a capital letter or a combination of upper and lower case? Does it need a number?) Choose two faults and include appropriate screenshots and pictures. The material should be different from that provided for P5 but any style or format you wish to use is acceptable.  user guides Task 4 – Additional support M4 provide additional support material to users

 Create a user or help sheet for ITSMAGIC users on how to back up files to a USB: Activity:

 If you have completed and evidenced the previous activities in this PowerPoint now carry out the following:  tions/virusesandlifestyles_act.shtml tions/virusesandlifestyles_act.shtml Differentiation:

 (University of Delaware - How to back-up data from hard drive(s) to external media.  drive-be-used-reliably-as-a-manual-backup-drive/ drive-be-used-reliably-as-a-manual-backup-drive/  (How-To Geek – Can a USB Flash drive be used reliability as a manual backup drive? Helpful links:

 Write up notes for insertion in a user guide (include relevant images including ITSMAGIC logo, contact details).  Share to OneDrive, hand in for next lesson. Homework: