Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

OPERATING EFFECTIVELY AT WESD. What is Internal Control? A process designed to provide reasonable assurance the organizations objectives are achieved.
Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
Computer Fraud Chapter 5.
Computer Fraud Chapter 5.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Mr C Johnston ICT Teacher
QMS Documentation Click the mouse to advance slides and animations in this slide show…
Functional areas Retail Business.
Factors to be taken into account when designing ICT Security Policies
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
New Data Regulation Law 201 CMR TJX Video.
Administrative Practices Outcome 1
Higher Administration
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
ITFM Outcome 2 - Impact of ICT1 Impact of ICT on Workflow The ability to access shared information, transmit information electronically and communicate.
General Purpose Packages
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
1. Define the term ‘database’(2) A database is a large and continuously updated collection of stored data structured to allow the various applications.
IT Security for Users By Matthew Moody.
1.1 System Performance Security Module 1 Version 5.
Security and backups GCSE ICT.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
OCR Cambridge National ICT Mr Conti 10X 25 th April 2014.
Ecords Management Records Management Paul Smallcombe Records & Information Compliance Manager.
ISO27001 Introduction to Information Security. Who has day-to-day responsibility? All of us! Why Information Security? Control risk, limit liability What.
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
1 Higher Administration Information Technology for Management Outcome 2: The impact of ICT on workflow, working practices and the management and security.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Small Business Security Keith Slagle April 24, 2007.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Communication in Administration (Security)
CONTROLLING INFORMATION SYSTEMS
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
 Face to face  Oral  Written  Visual  Electronic Communication in Administration 2.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
FACTORS AFFECTING THE EFFICIENCY OF DATA PROCESSING SYSTEMS.
 In this unit you will: impact  Assess the impact of TPS on participants.  Identify jobs  Identify jobs that have changed or have been created as a.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
1 Information Governance (For Dental Practices) Norman Pottinger Information Governance Manager NHS Suffolk.
Describe the Impact of ICT on Workflow, Working Practices and Management and Security of Information ITFM Outcome 2 Learning Intention Security of Information.
Scientific data storage: How are computers involved in the following?
Electronic Records Management Alan Cameron Records Management Consultant.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Welcome to the ICT Department Unit 3_5 Security Policies.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
8 – Protecting Data and Security
Payment Card Industry (PCI) Rules and Standards
Impact of ICT on Working Practices & Workflow
Learning Intention Legislations impact on security of information
Explaining strategies to ensure compliance with workplace legislation
Administrative Practices Outcome 1
Describe the Impact of ICT on Workflow, Working Practices and Management and Security of Information ITFM Outcome 2 © Inspiring Education 2006.
Business Risks of Insecure Networks
Security of People, Property and Information
G061 - Network Security.
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Learning Intention Security of Information

Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption of data Greater customer confidence is data is secure Organisation can be more confident that data is more reliable therefore enabling better decision making Loss of data can be time consuming and/or costly to replace Less open to fraud and consequent legal implications Flow of work is not disrupted Improved information handling Better security of data Efficient use of file memory Efficient time management in locating files

Methods of Securing Data: Physical Security Conduct an inventory – stock of goods - periodically to ensure that all equipment is present Tag all equipment recording details about the equipment and were it is located within the organisation Procedures implemented to ensure that staff who use portable computers/equipment must always lock them away in a safe place which only authorised people have access to Usernames and passwords are issued to staff to secure computer access/use Employees trained in use of password protected screensavers which ensure that any confidential information cannot be accessed when an employee is not at their machine Secure/lockable filing cabinets which ensure restricted access for authorised staff An efficient archiving system in operation Secure filing procedures including filing policy, file tracking and secure storage and retrieval Controlled access to certain areas of the organisation © Inspiring Education 2006

Methods of Securing Data: Electronic Security Different access levels for different users – restricting access to drives, folders or files Appropriate backup systems and procedures in place Use of electronic passwords to limit access to certain files or areas of the server – employees must also follow appropriate password management systems Use of data controls e.g. read-only files Automatic lock if password is entered incorrectly on a set number of occasions – like PIN number at ATM CCTV to DETER theft of data Encrypt data Install high-quality anti-virus software and update regularly Install Firewalls to prevent outside sources accessing your system/data – particularly important where e-commerce is in operation Forbid employees from using disks/CD Roms/Flash Pens etc which have been used on other computer system unless they have been checked on a stand-alone computer Install software to filter ‘spam’ s which may carry a virus Use of hard drive keys Ensure that all staff are informed and advised on organisational procedures and get The opportunity to receive training, hands-on demonstrations etc …

Methods of Securing Data: File Management What is File Management? The method (referring to both manual & electronic files) in which information is stored and organised allowing documents/files/folders to be accessed quickly, reducing time spent searching. A good file management system should include the following: All files having appropriate file names which are relevant to the information that they contain All related files are stored on an appropriately named folder Folders stored in the appropriate directory – a filing system allowing employees to store files in correct areas Out-of-date files are archived or removed regularly Creating back-ups of files and folders – copying of files on a regular basis should a system error occur ensuring that confidential information is not lost Use of passwords to limit access and protect files

Poor File Management Results in: Employee/organisations work is not completed on time Out-of-date information is accessed Information not being found Confidential information being accessed by unauthorised personnel Slowing down of the organisations system resulting in loss of time locating files Lack of customer satisfaction Legal implications/issues Decreased motivation of staff Low productivity Inefficiency

Poor File Management Consequences Out-of-date information being accessed Decision-making process will suffer If naming conventions are not followed sharing of files are hampered Files can’t be found Files/data may be lost Wastage of time searching for data Hard disk/server may become too full may result in poor customer service Infringement of Data Protection Act Confidential information accessed Implications Prosecution and/or fines Poor decision making Efficiency of the business is affected Reduction in profitability Business could end up failing/closing down due to customers being lost Security of the organisation is questioned Competitors could obtain this confidential information that could jeopardise the position of the company in the market If any files are completely lost it could mean that it costs the organisation time and money as they have to be recreated REMEMBER YOU NEED TO KNOW THE DIFFERENCE BETWEEN CONSEQUENCES AND IMPLICATIONS – CHECK YOUR COMMAND WORDS HANDOUT

Individual Questions 1. Outline the ways in which an organisation can monitor employee s. (2) 2. is an important method of communication. Discuss the impact of on an organisation. (6) 3. Discuss how developments in ICT have impacted on workflow and working practices. (8)

Methods of Ensuring Data Integrity In order to ensure data integrity organisations must create procedures and policies which prevent human error in accessing and using information which is stored electronically. There are a number of methods an organisation can take to ensure data integrity:  Appoint highly skilled personnel and delegate responsibility for managing the data management system. This measure will determine who has authority to input and process specific areas of information and prevent any unauthorised employees inputting false information.  Create an extensive training programme which trains all levels of employees within all areas of the organisation about the security measures which are required to maintain and use the data management system effectively.  Invest in the latest version of anti-viral software so that the data management system is fully protected against any viruses or data corruption. This is a very wise investment as the consequences of a virus can sometimes result in being irreparable. © Inspiring Education 2006