Data integrity and security

Slides:



Advertisements
Similar presentations
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Advertisements

A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Guanjong High School Group 2. Physical Network Access Security Getting into a network closet could easily allow someone to disable computers and connect.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Qualitative.
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Factors to be taken into account when designing ICT Security Policies
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Keeping Data Safe Revision Summer How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.
Eleventh Edition 1 Introduction to Information Systems Essentials for the Internetworked E-Business Enterprise Irwin/McGraw-Hill Copyright © 2002, The.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
LATEST TECHNOLOGICAL DEVELOPMENTS IN THE FIELD OF SECURITY AND PRIVACY.
What does “secure” mean? Protecting Valuables
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Security and backups GCSE ICT.
Computer security means protecting our computer system and the information they contain against unwanted access, damage, destruction or modification. Security.
Anti-virus software THERE ARE MANY ANTI VIRUS SOFTWARES TO KEEP YOU SAFE FROM VIRUS’S. THESE SOFTWARES ARE :  BULL GUARD  MCAFEE.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Physical Site Security.  Personnel  Hardware  Programs  Networks  Data  Protection from:  Fire  Natural disasters  Burglary / Theft  Vandalism.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
What security is about in general? Security is about protection of assets –D. Gollmann, Computer Security, Wiley Prevention –take measures that prevent.
ICT Homework- ICT Security Consultant PowerPoint.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Viewing Information Systems Security. The basic objectives of Information Security are the same as the basic objectives of EDP auditing. They are: 1.To.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chap1: Is there a Security Problem in Computing?.
Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )
LO: To be able to describe and compare physical and logical methods of security. All of you will be able to: Describe how physical security measures can.
Borders Business Programme IT and Marketing Functions of Web-based Systems Russell Taylor Lecturer in Computing Borders Business Programme.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Understand the importance of the security of data (personal and financial) and the main methods of protecting data from unauthorised access (both internally.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Bay Ridge Security Consulting (BRSC). Importance in Securing System  If don’t keep up with security issues or fixes Exploitation of root access Installation.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
START. A room full of computers Two or more computers connected together in order to communicate A computer that can communicate with every living thing.
Onsite CRM Security
Security Protecting information data confidentiality
Security Issues in Information Technology
Securing Information Systems
Slide Template for Module 4 Data Storage, Backup, and Security
Risk management.
Lecture 5. Security Threats
Why Computer Security Need???
Cyber Security By: Pratik Gandhi.
Operating system Security
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Answer the questions to reveal the blocks and guess the picture.
Lecture-16(B) Taking Protective Measures
Computer security Computer security means protecting our computer system and the information they contain againts unwanted access, damage,destruction or.
NETWORK SECURITY.
برنامج أمن أنظمة الحاسب
Security of Data  
Faculty of Science IT Department By Raz Dara MA.
Chapter 1 – Information Security Overview
Unit 4 IT Security Kerris Davies.
Networking for Home and Small Businesses – Chapter 8
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
Cybersecurity By Sri Kankanahalli.
Networking for Home and Small Businesses – Chapter 8
Networking for Home and Small Businesses – Chapter 8
Network Security Mark Creighton GBA 576 6/4/2019.
Computer Security (Summary)
G061 - Network Security.
Session 1 – Introduction to Information Security
Presentation transcript:

Data integrity and security Mrs. Gopee-Lochan

Ways data integrity can be lost Human error Natural disasters Worms and viruses Hardware malfunctions Malicious deletion or changing of data

Data Security Measures used to ensure that data has integrity. It protects data from unauthorized access.

Physical Software-based Data Security Physical Software-based

Physical data security Locks Security guards

Physical data security Monitoring systems using video cameras Burglar alarms

Physical data security Biometric scans

Physical data security Electronic doors Fire proof safe

Software-based security Passwords

Software-based security Firewall

Software-based security Anti-virus

Software-based security Encryption