Data security OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013.

Slides:



Advertisements
Similar presentations
Transfer Content to a Website What is FTP? File Transfer Protocol FTP is a protocol – a set of rules Designed to allow files to be transferred across.
Advertisements

GCSE ICT Networks & Security..
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013 Connecting.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Remote Assistance  Using this program you can allow someone to work on your computer, chat with you and view your screen with your permission  The other.
Administrative Practices Outcome 1
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
The World-Wide Web. Why we care? How much of your personal info was released to the Internet each time you view a Web page? How much of your personal.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
Connecting to USF Network for Web Site SSH Secure Shell is the FTP program you will use to download your http files onto the USF server. To get the SSH.
5.1 © 2004 Pearson Education, Inc. Lesson 5: Administering User Accounts Exam Microsoft® Windows® 2000 Directory Services Infrastructure Goals 
IT security By Tilly Gerlack.
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send.
XP New Perspectives on The Internet, Sixth Edition— Comprehensive Tutorial 1 1 Browser Basics Introduction to the Web and Web Browser Software Tutorial.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
Information Security Training for People who Supervise Computer Users.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Chapter 10: Rights, User, and Group Administration.
Encryption and Hacking By Steph Garrihy. What is Encryption? Encryption is when data is scrambled by software using a preset key so that anyone viewing.
Security & Privacy. Learning Objectives Explain the importance of varying the access allowed to database elements at different times and for different.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
Copy of the from the secure website - click on the AccoridaLife.zip link.
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send messages,
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Unit 1 Understanding computer systems: How to work with information and data to meet specific business needs OCR Cambridge Nationals in ICT Level 1/2 ©
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Directory Services CS5493/7493. Directory Services Directory services represent a technological breakthrough by integrating into a single management tool:
Backstage View  After you click the File tab, you can see the Microsoft Office Backstage view  The Office Backstage view is where you manage your files.
Maryknoll Wireless Network Access Steps for Windows 7 As of Aug 20, 2012.
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Computing.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Unit 1 Understanding computer systems: How ICT can be used to meet business needs OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton Remote.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
START. A room full of computers Two or more computers connected together in order to communicate A computer that can communicate with every living thing.
8 – Protecting Data and Security
Software OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013.
Tonga Institute of Higher Education IT 141: Information Systems
Choosing A Username and Password
How to use the internet safely and How to protect my personal data?
Handling Personal Data
Administrative Practices Outcome 1
Backstage view in word 2010.
Lesson Objectives Aims You should be able to:
Topic 1: Data, information, knowledge and processing
BP5 – encryption - Fun gym
Internet Protocol Mr. Paulk.
Topic 5: Communication and the Internet
Security of People, Property and Information
Software Introduction
Tonga Institute of Higher Education IT 141: Information Systems
Protecting IT systems (2)
BP5 – encryption - Fun gym
Lesson 2: Epic Security Considerations
Encryption and Hacking
REDCap and Data Governance
Security of Data  
Tonga Institute of Higher Education IT 141: Information Systems
Security.
Module 2 OBJECTIVE 14: Compare various security mechanisms.
Operating System Concepts
The Internet and Electronic mail
WJEC GCSE Computer Science
G061 - Network Security.
Presentation transcript:

Data security OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013

Data security Businesses such as supermarkets must make sure that the data they hold is kept safe and secure. UserIDs and passwords Access rights and permissions Physical security Encryption and https OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013

Passwords Passwords are used for security purposes, as only the correct user should know the password that goes with the userID. Passwords should not be written down and should be changed regularly, should not be related to the user so they can’t be guessed, should have at least 6 characters and should contain a mixture of characters. A secure password can be generated here: OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013

User IDs A userID, or user identity, or user name, for an account is used to identify the user to the computer system so that the correct access rights and files are made available when the account is accessed. UserIDs are usually easy to remember and related to the person e.g. the name or email address of the person. Only the password needs to be kept secret because access to the account is not possible without the password. OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013

Access rights and permissions Access to files stored on computer systems can be adjusted to control who can read, write, alter, save or delete the file. Access rights can be used to restrict access to certain employees. Setting access rights in Windows 7 Access rights in Linux OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013

Setting access rights in Microsoft Windows Access rights can be set in Microsoft Windows 7 via the ‘properties’ tab of a file: Who can use the file is set here Detailed control of actions What actions are available Advanced control OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013

File and folder permissions in e.g. Linux The access rights to a folder are set by adjusting the permissions on the folder. These are folders on a server: There are three groups of letters: the first is for the owner of the folder, the second is for the group to which the owner belongs, and the last is for all other users. d means this is a directory or folder, r means that the folder can be read, w means that the folder can be written to, x means that any files can executed or run by the user. OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013

Physical security Locks on doors and windows are obvious security measures. Other measures include: locking computer equipment away when not needed using security locks on the doors to computer rooms or offices using security cables to lock e.g. laptops to a desk the use of security cameras to monitor computer rooms guards to prevent unauthorised access to computer rooms OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013

Using security cables Security cables can be used to lock e.g. laptops or other equipment to a desk. OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013

Using security cameras Security cameras can monitor the activities in a computer room as well as other areas in the company offices; the output of the cameras can be watched by security staff. OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013

Unauthorised access Guards can help to prevent unauthorised access to computer rooms. OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013

Security locks on doors Security locks can be fitted to doors so that only those with the correct code can enter. Some security locks can be accessed using a key fob with an RFID tag inserted. Identity badges can have RFID tags inserted to allow access to certain areas. OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013

Encryption Encryption scrambles data using an encryption key so that it cannot be understood unless it is decrypted. This prevents unauthorised users from being able to understand the data. Be ready at 7.30! AXT @ TG& Q?>!VT WX 1 2 3 4 5 Same encryption key used to unscramble message Message written Encryption key used to scramble message Scrambled message sent Encrypted message Be ready at 7.30! 6 Message can be read OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013

HTTPS Https is ‘hypertext transfer protocol secure’ and is used for secure communication over networks providing authentication of a website and the encryption of the data being transferred to and from the website. This is an example of https: https shows in the URL A padlock is shown in the browser OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013