Safeguarding Data Securing data against exposure and destruction.

Slides:



Advertisements
Similar presentations
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Advertisements

Security and Control Soetam Rizky. Why Systems Are Vulnerable ?
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Privacy (or Data) Breaches - Examples South Carolina Department of Revenue Hackers got into the SCDOR’s computers, and stole information on up to 3.2 Million.
Identity Theft By: Nakeisha Barnett Thursday 2-3:15 3/4/06.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
The Cloud is Safe Pract The Facts. Backround: The recent hacking of the Cloud poses many issues with respect to Internet security. Just recently a hacker.
Government Databases and You or How I Learned to Stop Worrying and Love Information Loss. By Patrick Fahey Mis 304.
Information Security Steven Hall 21 st Jan Today’s Presentation Why do this now? What is information? The effects of lost information Newcastle.
Computer Forensics What is Computer Forensics? What is the importance of Computer Forensics? What do Computer Forensics specialists do? Applications of.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
STANFORD UNIVERSITY INFORMATION TECHNOLOGY SERVICES Windows Encryption File System (EFS) Tech Briefing July 18 th 2008
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Protecting ICT Systems
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Point of Sale Collection, cleanup and data analysis.
Brett Miller, Medical School Chief IT Security Officer IRBMED Seminar Series April 28, 2015 Data Security.
Use of IT Resources for Evidence Gathering & Analysis Use of IT Resources for Evidence Gathering & Analysis Raymond SO Wing-keung Assistant Director Independent.
IT Security for Users By Matthew Moody.
15 Maintaining a Web Site Section 15.1 Identify Webmastering tasks Identify Web server maintenance techniques Describe the importance of backups Section.
Dr.Backup Online Backup Service (888) (toll free)
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Security and backups GCSE ICT.
BACKUP AND ARCHIVING DATA BACKUP AND RECOVERY OF DATA.
 Information technology is defined as the use of computer hardware and software to manage information.  Six functions of data management: Convert.
The Simple Side of Computer Security for The Brownies That Like To Read!!
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Safeguarding Your Privacy Section 1.3. Safeguarding Your Privacy 1. What is Identity Theft? 2. Research a story on identity theft and be prepared to report.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
The State of Computer & Data Security in Corporations Independent Survey.
 You always need to have the latest anti- virus software so that you can prevent picking up unwanted virus’.  To prevent receiving junk mail, being.
Topic 5: Basic Security.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
WHAT IS HACKING? Hacking is an act of controlling computer systems to get information about the system and how it works. Technically, a hacker is someone.
What is it? CLOUD COMPUTING.  Connects to the cloud via the Internet  Does computing tasks, or  Runs applications, or  Stores Data THE AVERAGE CLOUD.
Backing up By Betsy Weaver 8H. What is backup, and why should you do it? w So that you don’t lose all your files if you are attacked by a virus or hackers,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School COMPUTER AND INTERNET SECURITY LESSON 9.
Cloud Computing 10 Cloud Computing 10. Cloud Computing 10 You’ll have heard about the ‘Cloud’ Lots of you will use it! But you need to be clear about.
Government Protection Consumers protected by both laws and agencies at different levels Look at table on page 30.
By: Taysha Johnson. What is an insider threat? 1.A current or former employee, contractor, or other business partner who has or had authorized access.
Dial-In Number: 1 (631) Webinar ID: FHC Tech Talk Automation and Efficiency Series Talk #1 Carbonite automated backup.
Networking Objectives Understand what the following policies will contain – Disaster recovery – Backup – Archiving – Acceptable use – failover.
INTRODUCTION TO DESKTOP SUPPORT
Alicia A. Coon COSC 480 October 27, 2006
Unit 13 IT Systems Troubleshooting and Repair Anne Sewell
Misuses of ICT Malpractice and crime © Folens 2008.
Chapter 1 Getting Started
Handling Personal Data
Section 15.1 Section 15.2 Identify Webmastering tasks
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Part 3.
Guarding against loss of data
Data Recovery: Why Secure Deletion is so Important.
Presentation transcript:

Safeguarding Data Securing data against exposure and destruction

Contents  News stories  Techniques  How those techniques could have helped  5 questions you should ask

Marie Lupe Cooley  Administrative assistant at Stephen E Hutchins Architects  Read a job description that matched her job; duties and contact details identical  Concluded she was about to be fired  Deleted 7 years of architectural plans  Damage estimated at $2.5 million

Marie Lupe Cooley  Job was for her boss’s wife’s firm  Plans weren’t backed up at all  Specialist firm reconstructed the files  Supposing Cooley had uploaded junk data to overwrite the segments?

Edison Chen  Canadian born singer and actor in Hong Kong  Sent his laptop in for servicing  Technicians found pornographic pictures of Chen with starlets  Published the photos on the internet  27-year old Chen announced his retirement in February

Francis Ford Coppola  Coppola trying to recover a computer stolen in a burglary  Contained a script Coppola had been working on for years  Script backed up on an external hard drive  Burglars also found and stole the hard drive

Britons’ banking details  2 CDs containing banking details of 25 million Britons posted to London from Newcastle  Data collected by HM Customs and Excise  Disks went missing and still haven’t been recovered

Britons’ banking details  Jeremy Clarkson believed data could not be used to hack accounts  Published his own banking details  Ethical hacker able to set up a direct deposit of £500 from his account to the Diabetes Foundation

Jerome Kerviel  Trader at Societe Generale in France  First worked in the back office  Then was made a Hedge Trader  His back office rights weren’t revoked  Kerviel set up several personas and traded under those IDs

Jerome Kerviel  Initially he was very successful  Subprime crisis in the US occurred  In all, his trades lost 5.8 billion Euros (over R70 billion)  Kerviel is on trial for fraud

Techniques  Backup servers (don’t use a main server as a backup server)  Some companies provide a data backup service for a monthly fee  User groups and access controls  Encryption  Erasing data off retired hardware

Access Control in action

Questions  Are users prevented from accessing data unrelated to their jobs?  Are users prevented from editing or deleting data unrelated to their job?  If a user’s role changes, are any access rights inappropriate to the new role revoked?

Questions  Is all vital data backed up in a geographically separate location from the primary data source?  When sensitive data is stored or transmitted, what is done to guard against exposure or corruption?