Data Security GCSE ICT.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Security, Privacy, and Ethics Online Computer Crimes.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
New Data Regulation Law 201 CMR TJX Video.
Threats to I.T Internet security By Cameron Mundy.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Protecting ICT Systems
Disaster Planning and Security Policies. Threats to data DeliberateTerrorism Criminal vandalism/sabotage White collar crime Accidental Floods and fire,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Data Confidentiality. Learning Objectives: By the end of this topic you should be able to: discuss the need to keep data confidential explain how data.
IT Security for Users By Matthew Moody.
1.1 System Performance Security Module 1 Version 5.
Security and backups GCSE ICT.
IT security By Tilly Gerlack.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Pass ECDL41 European Computer Driving Licence Module 1 – Concepts of IT Chapter 1.6 – Legal Issues and Security.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Data Security.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Policies and Security for Internet Access
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Computer Security Sample security policy Dr Alexei Vernitski.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
Intro to Digital Technology Review for Final Introduction to Digital Technology Finals Seniors Monday, 5/16 – 2 nd Tuesday 5/17 – 1 st,3 rd Underclassmen.
Technical Implementation: Security Risks
8 – Protecting Data and Security
Chapter 40 Internet Security.
What they are and how to protect against them
Malware and Computer Maintenance
Unit 13 IT Systems Troubleshooting and Repair Anne Sewell
Unit 4 IT Security.
Handling Personal Data
Business Risks of Insecure Networks
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Teaching Computing to GCSE
– Communication Technology in a Changing World
Fun gym Cambridge Nationals R001.
Fun gym Cambridge Nationals R001.
Security of People, Property and Information
ISNE101 Dr. Ken Cosh Week 13.
Planning and Security Policies
HOW DO I KEEP MY COMPUTER SAFE?
Security of Data  
Unit 4 IT Security Kerris Davies.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Data Security GCSE ICT

Network Security Physical security means that the hardware of the network is protected from theft and kept safe. Access security means that there is a limit to the amount of access a user has to the information held on the network. Data security means that there are measures taken to prevent the loss of data held on the system.

Data Security Confidential information must be kept securely Only authorised personnel should have access to confidential information Pass ECDL4

Backing Up Data You should always back up your data on a regular basis Keep a second copy of important files on a external hard drive, zip disk, USB flash solid state drive or magnetic tape and store it separately from your PC Your data is much more valuable than your computer equipment - it’s priceless You can protect your PC equipment with insurance, but this will not replace your data! Pass ECDL4

Backing Up Data Backups should have a schedule e.g. taken every hour, every day etc State what media you will save it on State where the backups are kept Specify how data can be recovered from backup

Archiving Archiving is a backup that is taken in case the original is lost. Archives are the backups that are not needed in the immediate short term but maybe required for future reference Instead of saving these files on computer it is better to save them on backing removable storage (as mentioned previously) and store them in a fireproof building away from the main site

Protecting data from accidental destruction User errors – untrained users may accidently delete files or save work over other work Fire – use smoke alarms to detect fires early Flood damage – don’t locate computers on the ground floor Power loss – Use an auxiliary power supply that comes on when the main supply cuts out Test new software - so that it doesn’t crash the current system

Protecting data from deliberate destruction Ensure authorisation levels are in place. Access rights so that people higher up the organisation can access more data. Also the rights could be restricted to read only access, allow deletion or read/write access. User names and passwords are in place to prevent unauthorised access. Passwords should be a mix of numbers, letters and symbols and changed regularly Use CCTV Use virus checkers to check information is not corrupted Firewalls to prevent hackers from accessing data from the internet Use biometric methods e.g. fingerprinting, retina scanning, face recognition

Encrypting and monitoring Software & Transaction logs Encryption – is the process of coding files before they are sent over networks/internet to protect them from hackers. Also coding information on the pc so if the computer is stolen files cannot be read. Monitoring software monitors network usage for unusual activity e.g. entering lots of passwords to try and gain access, this would then lock them out of the network Transaction logs – they monitor usage and produce an audit trail e.g. a deleted file will have the date and time of deletion and which member of staff deleted it

Encryption Example When you put in your card or bank details the website converts these into code using an algorithm (a program written specifically to do this). So instead of transmitting your card details via your phone line to the store server it sends the encoded details instead. At the other end the receiving computers must have the same piece of software (algorithm) and a ‘KEY’. The ‘KEY’ is like a password which tells the system how to decode the information. In theory even if someone intercepts (steals) this data then they won’t be able to access your bank details as they don’t have the key.

Ways of protecting you and your computer and network There are now many company's offering users different packages to protect and prevent your computer and or network. Most of theses packages detect, quarantine and delete infected files And some monitor the websites accessed and links to other servers and or networks.

Computer Viruses Viruses are small programs which are designed to cause damage to a computer or whole networks. They can delete files, programs etc They can also spy on your online use. Examples Trojans, boot sector, key logging software tracks what you are typing e.g. a password etc Your PC can catch a virus by sharing files on disks/CDs, viewing/downloading files on the web, USB flash drives and from e-mail attachments (these may contain EXE. Files) The only protection against this is having anti-virus software installed on your machine Pass ECDL4

Protection against viruses Scan files for viruses before opening them Make sure you keep your antivirus software up to date – 300 viruses are released into the wild every month – it only takes one to wreak havoc on your computer. Run a scan regularly. If on broadband, install a firewall to keep hackers away from your personal data. These help to filter out unauthorised requests from outside users. Pass ECDL4

Malware Malicious software Programs that can alter systems software to redirect it to other sites Take over your computer remotely Programs that make your computer run slow Programs that make your computer freeze or crash Firewalls Pass ECDL4

Physical security for a network As well as security software you will need to protect your network in more conventional ways i.e. lock and key. Fire protection- fire doors, smoke doors, fire proof safes est. Alarms-rooms containing the server should be alarmed Locks-all rooms with services inside and have limited recorded access to them Visibility-avoid putting computers on ground flour and where they are visible to passes bye

Links to Progress Leisure Pre-Release From Progress Leisure pre-release material: Security methods, including two-factor authentication Policies and procedures for Internet access ‘Customers log on to the website through a web browser or smartphone app using two-factor authentication.’ ‘Before using the wireless network, customers must agree to the Progress Leisure Acceptable Use Policy.’

Policy and Security – Single-factor Authentication Single-factor authentication (SFA) is where the user can obtain access to an account or service using one factor such as a username and password. Risky if same password used for many applications Recommend using unique password for each application

Policy and Security – Two-factor Authentication Two-factor authentication is a security method by which users obtain access by providing two separate factors to identify themselves. Three different types of factors that can be used for authentication are: Knowledge factor – knowing a password / PIN number Possession factor – owning a membership card / mobile Biometric factor – human characteristic fingerprint/DNA

Policy and Security – Two-factor Authentication Bank card reader example Customer needs: PIN number (knowledge) and Debit card (possession) to log in to their account Customer places card in reader and enters PIN number. The passcode displayed on the card reader is entered into a web login page to allow the customer account access.

Policy and Security – Two-factor Authentication Mobile transaction numbers (mTANs) example Member needs: Password (knowledge) Mobile phone (possession) This simple method of two-factor authentication would be suitable for Progress Leisure, as members only need knowledge of their password and possession of one of the following: Their laptop/tablet computer and their mobile phone Their smartphone for direct login Member enters username and password into Progress Leisure login page Progress Leisure receives login request from member and texts security code to member’s mobile phone Member then enters the security code to log in to the website

Policy and Security – Two-factor Authentication Two-factor authentication benefits Greater security than simply password protection Deterrent as hackers are likely to avoid this more secure system Two-factor authentication limitations Phone or card/reader needed to log on Customers dislike the extra time taken to log on

Policy and Security – Further Security Methods Password advice Use strong passwords with a mixture of numbers, letters, symbols and lower/upper case Change passwords regularly Access rights – set up by system administrator to limit network access to relevant files only for a user Encryption – used to make stored data more secure, by making it unreadable to people who do not have the key to decode it

For a company being hacked into can have various consequences, some of which can be seen below For personal users it can be just as serious but for other reasons!!