UNIT 19 Data Security 2.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Direct Attacks on Computational Devices
Debit Card Plastic card that looks like a credit card
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Prepared by: Nahed Al-Salah
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Passage Three Storage Devices. Training target: In this part , you should try your best to form good reading habits. In order to avoid your ill habits.
Chapter 3 – Computer Hardware Computer Components – Hardware (cont.) Lecture 3.
Introduction to Networks Networking Concepts IST-200 VWCC 1.
Internet safety By Lydia Snowden.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
Introduction to Computers Personal Computing 10. What is a computer? Electronic device Performs instructions in a program Performs four functions –Accepts.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Network and Internet Security and Privacy.  Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Networked Information Systems 1 Advantages of and classified by their size & architecture or design.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
INFO1 – Practical problem solving in the digital world
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
CHAPTER 7: PRIVACY, CRIME, AND SECURITY. Privacy in Cyberspace  Privacy: an individual’s ability to restrict or eliminate the collection, use and sale.
1. MAGNETIC HARD DRIVES 2. SOLID STATE DRIVES 3. OPTICAL DISKS 4. FLASH MEMORY 5. CLOUD STORAGE 6. CONNECTIVITY DEVICES Storage and connectivity devices.
Computer Literacy BASICS
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
UNIT 19 Data Security 2.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Lesson 8—Networking BASICS1 Networking BASICS Managing a Local Area Network Unit 2 Lesson 8.
Transferring data.  Most commercial computer users need to allow their employees to share data.  It also needs more than one employee to access the.
By: Nathan Narvaez. A system that links together electronic office equipment, such as computers and word processors, and forms a network within an office.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
CPT 123 Internet Skills Class Notes Internet Security Session B.
KEYBOARDING 1 Computer Basics. Definitions Computer  An electronic, digital, programmable machine that has four functions  accepts input  processes.
Networks. What is a Network? A network is a collection of computers and other devices that allow computer users to send and receive information to and.
Information Systems Design and Development Security Precautions Computing Science.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
START. A room full of computers Two or more computers connected together in order to communicate A computer that can communicate with every living thing.
Chapter 6 Protecting Your Files
Computer Literacy BASICS
Network and Internet Security and Privacy
WHAT IS A NETWORK TYPES OF NETWORK NETWORK HARDWARE
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
SECURITY FEATURES OF ATM
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Operating Systems What are they and why do we need them?
Introduction to Computers
مقدمة في الحاسب الآلي T. Arwa Alsarami.
Chapter 7.
Jeopardy Security Risks Hardware & Software Computer Types Networking
Network and Internet Security and Privacy
Part 3.
What is Information Security?
Computer Literacy BASICS
PLANNING A SECURE BASELINE INSTALLATION
Information Technology and AISs
G061 - Network Security.
The Computer’s Hardware
Presentation transcript:

UNIT 19 Data Security 2

Introduction

Introduction There are a variety of security measures that can be used to protect hardware and software including: Controlling the physical access to hardware and software. Backing up data and programs: storing a copy of files on a storage device to keep them safe. Implementing network controls such as: Using passwords (a secret code used to control access to a network system).

Introduction Installing a firewall (a combination of hardware and software used to control the data going into and out of a network. It is used to prevent unauthorized access to the network by hackers). Encrypting data (protecting data by putting it in a form only authorized users can understand).

Introduction Installing a callback system ( a system that automatically disconnects a telephone line after receiving a call and then dials the telephone number of the system that made the call, to reconnect the line. It is used in remote access systems to make sure that connections can only be made from permitted telephone numbers). Using signature verification or biometric security devices.

Introduction Separating and rotating the computing functions carried out by employees and carrying out periodic audits of the system (observing and recording events on the network systematically).

Introduction 5) Protecting against natural disasters by installing uninterruptible power supplies(UPS) and surge protectors. Electronic devices that protect equipment from damage due to a sudden surge in a power supply battery backup systems that automatically provide power to a computer when the normal electricity source fails.

Introduction Protecting against viruses by using anti virus programs and ensuring that all software is free of viruses before it is installed. Particular care should be taken when using public domain software (freeware) and shareware. An anti-virus program is a program that checks files for virus coding instructions inside another program and can be used for removing any virus coding instructions detected. computer programs or sets of programs used to detect, identify and remove viruses from a computer system

Introduction A smart card is a plastic card containing a processor and a memory chip. It can be used to store large amounts of confidential data including coded data that can be used as digital cash. Electronic currency that is used for making electronic purchases over the Internet

Introduction It can also be used as a security device to prevent or allow access to a system and allow the user to withdraw cash from a bank ATM. Automatic Teller Machine- a type of machine used by banks for enabling customers to withdraw money from their bank accounts.

Introduction A smart card reader is a device used for reading smart cards by detecting radio signals emitted from a radio antenna in the form of a small coil inside the smart card.

Introduction Data is commonly stored on a LAN (Local Area Network) by attaching storage devices to a server. Common storage devices include tape drives, RAID and optical devices such as CD-Roms. A computer that provides a network service A set of hard disks that work as one unit

Introduction In large networks, server farms are used. The storage devices are often attached using a connection standard known as SCSI (Small Computer Systems Interface) LANs with larger storage needs can add NAS (Networked Attached Storage) devices. They attach to the LAN and are available to all systems on the LAN without needing to be attached to a server computer. Large collections of networked server computers that work together by sharing the service workload

Introduction The biggest network systems can also use a SAN (Storage Area Network). This is a storage network that uses high speed copper or fiber optic connections such as Fiber Channel (a high speed interconnection standard). The SAN is a separate network that is interconnected to the main LAN. It is therefore available to all LAN users and can be centrally managed.