Understand mechanisms to control organisational IT security

Slides:



Advertisements
Similar presentations
09/04/2015Unit 2 (b) Back-Office processes Unit 2 Assessment Criteria (b) 10 marks.
Advertisements

 Transaction  It is a business event for example a sale of inventory “Hall 2009”
Significant Social & Ethical Issues. Significant Issues Year 2000 Y2K Problem Viruses Reliance on Software.
Unit 28- Website Development Assignment 1- THEORY P3
Factors to be taken into account when designing ICT Security Policies
Saving and borrowing in Finland Spring Survey Coverage: 2,400 persons (aged 15 to 74) Time of interviews: January 2009 Interviewed by: IRO Research.
Outsourcing Policy & Procedures An Overview for Staff Prepared by MSM Compliance Services Pty Ltd.
Information Systems Controls for System Reliability -Information Security-
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Corporate Purchasing Card Enhanced Reporting January 2015 Web Version 1.
Legislation For e-commerce to operate correctly, it needs to adhere to the relevant legislation. These laws protect both the business and the consumer.
Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.
ICT Exam Techniques This is a guide on how to achieve the maximum marks on the ICT Unit 1 Examination Paper.
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
ISO27001 Introduction to Information Security. Who has day-to-day responsibility? All of us! Why Information Security? Control risk, limit liability What.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Stanford Computer Security and You . Higher Education  Higher education environment is open, sharing, exploratory, experimental  Many information assets.
Feedback on marking and next section. Feedback Do not copy from exemplar materials. All information in the project must be your own or acknowledged Remember.
DATA PROTECTION & FREEDOM OF INFORMATION. What is the difference between Data Protection & Freedom of Information? The Data Protection Act allows you.
The Data Protection Act What Data is Held on Individuals? By institutions: –Criminal information, –Educational information; –Medical Information;
 You always need to have the latest anti- virus software so that you can prevent picking up unwanted virus’.  To prevent receiving junk mail, being.
ThankQ Solutions Pty Ltd Tech Forum 2013 PCI Compliance.
Alert against Online Shopping Frauds. Online Shopping A form of electronic commerce whereby consumers directly buy goods or services from a seller over.
Organisations and Data Management 1 Data Collection: Why organisations & individuals acquire data & supply data via websites 2Techniques used by organisations.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Mr C Johnston ICT Teacher
Limitations and constraints
Risks and Protection. What are the risks of shopping online? Spend 2 minutes identifying risks associated with shopping online card details could be stolen.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
Session 12 Information management and security. 1 Contents Part 1: Introduction Part 2: Legal and regulatory responsibilities Part 3: Our Procedures Part.
Policies and Security for Internet Access
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
Online Shopping. Learning Objectives To learn how society has been affected by online shopping (e-Commerce)
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Welcome to the ICT Department Unit 3_5 Security Policies.
OCR Nationals - Unit 8 E-commerce – go to slide 11.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
1. Get out homework 2. Open the “Data Security” document from the shared area and save it in to your area. Business Studies/Year 11/AQA Revision/6 Data.
Online Banking. Learning Objectives To learn how society has been affected by online banking.
BTEC ICT Level 3 Unit 8 E-Commerce
Information and documentation media systems.
Outsourcing Policy & Procedures
Unit 13 IT Systems Troubleshooting and Repair Anne Sewell
Year 8 ICT Internet Security
Handling Personal Data
Protecting Your Identity:
Internet Payment.
TB2 Lesson 5 Data Protection
Understand mechanisms to control organisational IT security
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Unit 7 – Organisational Systems Security
15 Sources of management information and management report 余慧欣 刘思怡 程曦.
Unit 3 Information Systems
Part 3.
Understand Risks to IT Security
Assignment 2 Unit 1 Business skills for e-commerce
Cambridge TECHNICALS- LEVEL 3
Feasibility study and proposed solutions
Assignment 2 Unit 1 Business skills for e-commerce
Data Protection.
Chapter 12 selling overview Section 12.1 The Sales Function
Understand mechanisms to control organisational IT security
How it affects policies and procedures
Assignment 2: Activity 2 Produce a written report to explain how software utilities can improve the performance of Computer Systems. Select 3-4 utilities.
BTEC ICT Level 3 Unit 8 E-Commerce
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Presentation transcript:

Understand mechanisms to control organisational IT security Unit 48 I.T. Security Management HND in Computing and Systems Development

Understand mechanisms to control organisational IT security Risk assessment √ Data protection Physical security

Data protection: government regulations company regulations: eg Data Protection Act 1998, Computer Misuse Act 1990; company regulations: eg site or system access criteria for personnel; anti-virus software; firewalls, basic encryption techniques; operational continuity planning; back-up procedures

Data protection: “The number of customers affected and the amount of data potentially stolen is smaller than originally feared…” Dido Harding interview, Sunday Times, 25/10/15 "It wasn't encrypted, nor are you legally required to encrypt it," "We have complied with all of our legal obligations in terms of storing of financial information."

Task You work for a company with a website that takes sensitive customer details over the web including credit card details for purchases, You have returned to work the Monday morning after this article was run in the Sunday Times. Your line manager wants to know if DH is correct and is there a potential cost-saving for your company ie. Can you avoid using encryption? Research facts to support a case either for or against this proposal, write a report for your boss giving your response Remember to include counter arguments Quote relevant legislation Include financial data to support your arguments.