IT Applications Theory Slideshows

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

VCE IT Theory Slideshows By Mark Kelly McKinnon Secondary College Vceit.com Intranet, Internet, VPN.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
1 Protecting Your Computer Internet Annoyances (Already done in Chapter 3) Spam Pop-ups Identity theft phishing hoaxes Spyware.
IT Applications Theory Slideshows By Mark Kelly Vceit.com Data Security.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Data Security GCSE ICT.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Alisha Horsfield INTERNET SAFETY. firewall Firewall- a system made to stop unauthorised access to or from a private network Firewalls also protects your.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
CS101 Lecture 14 Security. Network = Security Risks The majority of the bad things that can be done deliberately to you or your computer happen when you.
Detrick Robinson & Amris Treadwell.  Computer viruses- are pieces of programs that are purposely made up to infect your computer.  Examples: › Internet.
Hacker Zombie Computer Reflectors Target.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
File Management Mark Kelly vceit.com.
IT Applications Theory Slideshows By Mark Kelly Vceit.com Virtual Team File Management.
Threat to I.T Security By Otis Powers. Hacking Hacking is a big threat to society because it could expose secrets of the I.T industry that perhaps should.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS). SELECT AND USE APPROPRIATE METHODS TO MINIMISE SECURITY RISK TO IT SYSTEMS AND DATA 1.1 I can describe.
Jan 11 Encryption and Hacking. Your Answer Encryption is used to keep information safe from unauthorised users. The best way to keep the system safe is.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
Understanding Computer Viruses: What They Can Do, Why People Write Them and How to Defend Against Them Computer Hardware and Software Maintenance.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Software Development DATA SECURITY. Data Security What is data security? Procedures & equipment to protect data Consequences of not protecting.
Communication in Administration (Security)
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
VCE IT Theory Slideshows By Mark Kelly Vceit.com Websites & Data.
NETWORKS – DIGITAL SILK SOFTWARE DEVELOPMENT UNIT 4 – OUTCOME 2.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems Design and Development Security Precautions Computing Science.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Network System Security - Task 2. Russell Johnston.
ITS220 – How To Prevent Your PC From Infected by Virus presented by Desmond Ho.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
VCE IT Theory Slideshows
Chapter 40 Internet Security.
What they are and how to protect against them
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
IT Applications Theory Slideshows
Unit 4 IT Security.
IT Applications Theory Slideshows
Backing up a Hard Disk Windows XP Tutorial 6.
Business Risks of Insecure Networks
Security in Networking
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Chapter 6 Purchasing and Maintaining a Computer
Data Security GCSE ICT.
برنامج أمن أنظمة الحاسب
Part 3.
Backup and restoration of data, redundancy
Computer Security.
Security of Data  
Faculty of Science IT Department By Raz Dara MA.
Protecting Data and Information
G061 - Network Security.
6. Application Software Security
Presentation transcript:

IT Applications Theory Slideshows Data Security By Mark Kelly Vceit.com

Contents Physical and software controls for protecting stored and communicated data. ‘Zits’

Data Security Virtual teams often work with confidential or secret data All data needs to be protected against loss or damage Sensitive information needs protection against theft

SOFTWARE - Passwords Passwords can be applied to: Individual computers Network access Website access FTP access Opening documents Changing documents A password-protected database

SOFTWARE + HARDWARE - Biometric ID Passwords are weak protection Easily forgotten, discovered, guessed Biometric ID measures a unique physical attribute of an individual, e.g. Fingerprint Iris pattern (the coloured bit of the eye) Retinal pattern (the blood vessels at the back of the eye) Can’t be copied, faked, stolen as passwords and swipe cards can

SOFTWARE - Encryption Makes stored files unreadable for unauthorised people Public Key encryption does not have an unlocking key - the weak point of all previous encryption systems Public key encryption (look up RSA, PGP) is very, VERY hard to break Even if an encrypted document is stolen or copied, it is worthless to the thief

Encryption during communication SSL (Secure Socket Layer) and TLS (Transport Layer Security) encrypt web traffic Is active when the padlock in your browser snaps shut Messages between web servers (e.g. banks) and visitors are encrypted by the sender and decrypted by the recipient Secure sites sometimes identifiable by a HTTPS:// prefix

SOFTWARE - Access hierarchy Different users get different levels of access to data Level of access based on what they need to get their work done Prevents unskilled, stupid or evil people deliberately, carelessly or accidentally destroying data

Access hierarchy Databases, for example, can assign rights such as: See some data, but not all See all data, but not add/delete/change change it Add data but not delete any Add and delete data but not change any programming or presentation layouts Access all areas

Access Privileges in Filemaker

Safe Disposal ‘Deleted’ files are easily recovered To be safe, unwanted files should be wiped Military-grade wiping involves overwriting data at least 7 times with rubbish data Computers being disposed of should have their hard disks reformatted. But reformatting can be reversed! Some organisers shred used hard disks to be sure. The disks are physically pulverised.

Hard disk destruction Hours of crushing fun… http://www.youtube.com/watch?v=sQYPCPB1g3o http://www.youtube.com/watch?v=8qImGK8bHjE

Backups Backup = copying data so it can be restored if the original is lost or damaged Must be done regularly (daily!) Must be stored offsite Procedure must be tested and documented

Backup types Full = copy absolutely everything: new and old data and programs Incremental (partial, differential) = copy only files that are new or have been changed since the last backup.

Typical Scheme Weekly full backups Daily incremental backups To restore data, reload the latest full backup and then add on all the incremental backups made since then. Backups are increasingly being done continuously to the cloud.

Continuous Data Protection (CDP) Changed files are automatically saved to local or remote storage Different versions of the same-named file can be restored Can save to cloud, local network, or remtoe friend’s computer E.g. CRASHPLAN.COM

Backup Media “Media” = what the data is saved to Tape = large capacity, slow, wears out, expensive. Very common Removable hard disk = fast, large capacity, cheap. CD/DVD = relatively low capacity, easily damaged. Non-magnetic, so not hurt by electromagnetic fields as are tapes, HDDs.

Backup Media Selection criteria: Read/write speed Capacity Lifetime of recorded data Robustness (e.g. against scratching, magnetic fields)

Archiving Copy obsolete data to secondary storage (e.g. DVD) and delete the original data. Backing up = copy data, keep the original.

Virus scanners Must have up-to-date virus definitions Must be running all the time Must be accurate: false-positives – wrongly believes a virus exists false-negatives – fails to identify a virus Even market-leading products are imperfect Some free products (e.g. Avira) outperformed Symantec & McAfee in a test in 2009.

Other scanners Malware – spyware, adware. Either does bad things (e.g. monitoring users’ actions) or is badly programmed and badly affects the stability of computers.

Other scanners Trojan Horses – bad software installed by users who think it’s innocent. Payloads: Keylogger: records passwords, credit card info, bank account logins & sends them to hackers. Spamming agent: your computer acts as a zombie sending spam on behalf of the hacker Distributed Denial Of Service (DDOS) attack: your computer is taken over and joins a concerted attack on a server chosen by the hacker.

Firewalls Closes unused internet communication ports Your computer has 65535 of them, but you only use about 3. Hackers can gain entry to a PC through unguarded ports Firewalls close the unused ports Open ports are watched to ensure only authorised programs use them (preventing Trojans sending spam or DDOS attacks)

Software Firewalls Can be software or hardware firewalls Software: Windows Firewall, Zone Alarm Needs training when first installed. You teach it which programs are allowed to connect to the internet

Hardware firewalls Routers – on all Local Area Networks, and in nearly all home/office cable/ADSL modems Can use Stateful Packet Inspection (SPI) to examine inside data packets to see if they’re harmful. Protect against incoming bad data, but not outgoing bad data. If you’re already infected by a Trojan, a router won’t stop your PC sending spam, keylogs etc

Other physical controls Locked doors Barred windows UPS (uninterruptible power supply) to protect file servers or workstations from power overloads, blackouts Air conditioning to protect hardware from humidity, heat. Swipe cards to control physical user access

More physical controls ‘Kensington cable’ discourages thieves walking off with items. Quality door locks Window locks

Consequences of not protecting data

Consequences loss of trade secrets potential violation of the Privacy Act, Health Records Act etc if personal information is damaged or released loss of reputation as a trustworthy organisation loss of income after catastrophic data loss destroys your ability to get paid by customers or conduct business prosecution by the tax office if tax records are lost corporate death

And because you’ve been good…

IT APPLICATIONS SLIDESHOWS By Mark Kelly mark@vceit.com vceit.com These slideshows may be freely used, modified or distributed by teachers and students anywhere on the planet (but not elsewhere). They may NOT be sold. They must NOT be redistributed if you modify them.