Level 2 Diploma Unit 11 IT Security

Slides:



Advertisements
Similar presentations
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Advertisements

Share Your PC Get Started. Sharing a computer used to mean that others could see your private files, install software you didn't want, or change your.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Securing. Agenda  Hard Drive Encryption  User Account Permissions  Root Level Access  Firewall Protection  Malware Protection.
Chapter 17 Controls and Security Measures
Client/Server Computing Model of computing in which very powerful personal computers (clients) are connected in a network with one or more server computers.
KEEPING YOUR SECURE DATA SECURE TRUECRPYT. WHAT IS TRUECRYPT Small program for encrypting files What is encrypting? Scrambling the data Password protecting.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
AN OVERVIEW OF MAC PDF TOOLS 1. PDF Tools for Mac PDF files can be used either in Windows, Unix or Apple’s Mac OS operating system commonly. It still.
Copyright © 2015 Pearson Education, Inc. Confidentiality and Privacy Controls Chapter
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
Course ILT Security Unit objectives Configure operating system and file system security Install a fingerprint scanner and card reader Manage the human.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Jim McLeod MyDBA  SQL Server Performance Tuning Consultant with MyDBA  Microsoft Certified Trainer with SQLskills Australia 
Unit 19 INTERNET SECURITY
Windows Vista Security Center Chapter 5(WV): Protecting Your Computer 9/17/20151Instructor: Shilpa Phanse.
E-Commerce Security Technologies : Theft of credit card numbers Denial of service attacks (System not availability ) Consumer privacy (Confidentiality.
COMPREHENSIVE Windows Tutorial 5 Protecting Your Computer.
Troubleshooting Windows Vista Security Chapter 4.
PowerPoint Lesson 10 Sharing and Delivering Presentations Microsoft Office 2010 Advanced Cable / Morrison 1.
Agenda Definitions Why cryptography is important? Available technologies Benefits & problems.
Copyright © 2012 Certification Partners, LLC -- All Rights Reserved Lesson 8 Protecting Yourself Online.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
1. Chapter 25 Protecting and Preparing Documents.
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
Encryption and Security Dylan Anderson Michael Huffman Julie Rothacher Dylan Anderson Michael Huffman Julie Rothacher.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Internet Security. Four Issues of Internet Security Authenticity: Is the sender of a message who they claim to be? Privacy: Are the contents of a message.
3.06 Data Encryption Unit 3 Internet Basics. Introduction In May of 2006, an analyst with the U.S. Department of Veterans Affairs was robbed of his notebook.
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
DIGITAL SIGNATURE.
Database Security Cmpe 226 Fall 2015 By Akanksha Jain Jerry Mengyuan Zheng.
1 of 4 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Copyright © 2007 Heathkit Company, Inc. All Rights Reserved PC Fundamentals Presentation 14 – Windows Security.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Product Training 1 JetFlash Software Application.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the importance of security and encryption. Objective Course Weight 2%
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Information Systems Design and Development Security Precautions Computing Science.
Windows Vista Configuration MCTS : NTFS Security Features and File Sharing.
AUTOMOBILE CYBER SECURITY David McPeak. EVOLUTION IN DESIGN/TECHNOLOGY.
Windows Tutorial 5 Protecting Your Computer
8 – Protecting Data and Security
Unit 3 Section 6.4: Internet Security
Chapter 40 Internet Security.
Internet Business Associate v2.0
ITMT Windows 7 Configuration Chapter 10 – Securing Windows 7
Data security OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013.
Network Security Presented by: JAISURYA BANERJEA MBA, 2ND Semester.
Unit 13 IT Systems Troubleshooting and Repair Anne Sewell
Unit 4 IT Security.
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Trend Micro Antivirus + Security To Buy Visit : Or Contact : (855)
Software Introduction
Secure Electronic Transaction (SET) University of Windsor
Microsoft Office Access 2003
Faculty of Science IT Department By Raz Dara MA.
Security.
Securing Windows 7 Lesson 10.
Group 2 module 2 obj 15 explain the meaning of terms related to the security of Information Technology Systems.
Operating System Concepts
Designing IIS Security (IIS – Internet Information Service)
Electronic Payment Security Technologies
Operating Systems Concepts
G061 - Network Security.
Presentation transcript:

Level 2 Diploma Unit 11 IT Security Data security Level 2 Diploma Unit 11 IT Security

Physical protection Limiting visibility of monitors Not overlooked Restricted vision screens Blackout Privacy Filter prevents unauthorized viewing Micro-louvre technology creates a narrow viewing angle Image is only visible to those directly in front of the screen Side view is black

Encryption “Scrambles” data on the disk so that it cannot be read without knowing the key Can be set in folder properties Uses the account details as a key Need to export keys and save elsewhere In case account is deleted or invalid In case you want to use different computers

Encryption This is one of the simplest forms of encryption: Aycqyp sqcb rfgq ambc. This is more sophisticated and demands that you have a key to decrypt it: Dygh vcnv rdhy 200 nxobj hd ufori Of course you can make it even harder: Dyg hvc nvr dhy 200 nxo bjh duf ori a b c d e f g h i j k l m n o p q r s t u v w x y z Plain text Code

Encryption Even if you have this table you still can’t decode without the key!

When would you encrypt? to protect information from unauthorised view credit card numbers bank account information personal health, income, tax, benefits information personal correspondence commercially sensitive information

Recovering encrypted data In Windows you must create a recovery certificate for encrypted files A recovery certificate is a special Encrypting File System (EFS) certificate Requires administrator permissions Enables you to recover encrypted files if your encryption key is lost or damaged

Folder properties

Software protection Anti virus Spyware protection In teams of 2 research 5 examples of software that protects against virus and spyware Compare their features and cost Arrange them in order of your choice of the most effective Present your results

Password protection of files Available on Office files

Digital signatures A digital signature validates the authenticity of a digital message or document. Checks the message was created by a known sender, it was not altered in transit. Mainly used for software distribution and financial transactions,