Understand mechanisms to control organisational IT security

Slides:



Advertisements
Similar presentations
Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
Advertisements

Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Security Strategy. You will need to be able to explain:  Data Security  Data Integrity and  Data Privacy  Risks  Hacking  Denial of Service DOS.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
The Health and safety Act, is an act to make further provision for securing the health and safety and welfare of persons at work.For protecting others.
Accounting Information Systems Chapter Outlines
University of Sunderland Professionalism and Personal Skills Unit 11 Professionalism and Personal Skills Computer Legislation.
The Data Protection Act The Data Protection Act controls how your personal information is used by organisations, businesses or the government. Everyone.
The Legal Framework Can you work out which slide each bullet point should go on?!
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
General Purpose Packages
Law Additional Exercise ANSWERS. Question #1 (a) Any one of: gain unauthorised access (1st) to computer material (1) gain (unauthorised) access to computer.
Introduction to Computer Security1 Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st semester University of.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
Files are at risk from loss if your computer breaks or if you get a virus. Files can also become corrupted. Solutions: Make regular back ups of files Use.
BTEC ICT Legal Issues Data Protection Act (1998) Computer Misuse Act (1990) Freedom of Information Act (2000)
The Computer Misuse Act of1990 The Copyright, Designs & Patents Act of
McGraw-Hill/Irwin © 2013 The McGraw-Hill Companies, Inc., All Rights Reserved. Chapter 11 Computer Crime and Information Technology Security.
Computer Misuse By: Alex Meadows Michael Read. How can you misuse a computer? Accessing data stored electronically Copying software without permission.
LEGISLATION. DATA PROTECTION ACT (1998) The aim of this act give people the right to know what information is held about them. It also sets out rules.
Information Systems Unit 3.
Computer Systems D Stainton. Computer Misuse What is computer misuse? Criminal offences which can be committed using a computer.
ICT Legislation  Copyright, Designs and Patents Act (1988);  Computer Misuse Act (1990);  Health and Safety at Work Act (1974);  EU Health and Safety.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Business Ethics and Social Responsibility GCSE Business and Communication Systems Business and Communication Systems.
Computing and Ethics & The Law. The Law Copyright, Designs and Patents Act (1988) Computer Misuse Act (1990) Data Protection Act (1998) (8 Main Principles)
Computer Misuse Act INTRODUCTION The Computer Misuse Act became law in August Under the Act hacking and the introduction of viruses are criminal.
NEVER USE YOUR REAL NAME ALAWYS USE A NICKNAME IS SOMEONE SENDS SOME NASTY OR RUDE DON’T DELET IT SHOW IT TO SOMEONE DON’T GIVE ANYONE YOU DON’T KNOW A.
1. Get out homework 2. Open the “Data Security” document from the shared area and save it in to your area. Business Studies/Year 11/AQA Revision/6 Data.
Chapter 40 Internet Security.
Unit 36: Internet Server Management
Outsourcing Policy & Procedures
Specification a. discuss the impact of ICT on society, organisations and individuals; b. discuss possible future developments in ICT and their impact on.
Administrative Practices Outcome 1
Larry Brownfield, CPO, OHE – KOA, Inc.
Protecting Your Identity:
Chapter 5 : Designing Windows Server-Level Security Processes
Data Protection Act and Other Laws
Legislation in ICT.
Assignment 2 Unit 2 Computer Systems.
Care Act – Strategic Partner Engagement
INFORMATION SECURITY The protection of information from accidental or intentional misuse of a persons inside or outside an organization Comp 212 – Computer.
Business Risks of Insecure Networks
Understand mechanisms to control organisational IT security
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Learning Aim B: Examine the ethical issues when Providing care and support to meet the individual needs. B1 & B2.
Year 10 ICT ECDL/ICDL IT Security.
Unit 7 – Organisational Systems Security
Understanding the issues related to the use of information
CYB 110 Education Begins / Snaptutorial.com. CYB 110 All Assignments For more classes visit CYB 110 Week 1 Individual Protecting.
CYB 110 Education Begins / tutorialrank.com. CYB 110 All Assignments For more course tutorials visit CYB 110 Week 1 Individual Protecting.
Cyber Crime Today we will look at: Different types of cyber-crime
Data Protection Act and Computer Misuse Act ANSWERS.
Computer Systems D Stainton.
Computer Misuse Act 1990.
Unit 7 – Organisational Systems Security
Understand mechanisms to control organisational IT security
Legal and Ethical Issues
Unit 3 Information Systems
Understand Risks to IT Security
Encryption and Hacking
Encryption and Hacking
Legislation in ICT.
Computer Misuse Act 1990 GCSE ICT.
Information security planning
How it affects policies and procedures
Assignment 2: Activity 2 Produce a written report to explain how software utilities can improve the performance of Computer Systems. Select 3-4 utilities.
Revision Lesson 10X5.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
End User Support By Dominique Stainton.
Presentation transcript:

Understand mechanisms to control organisational IT security Unit 48 I.T. Security Management HND in Computing and Systems Development Understand mechanisms to control organisational IT security

Understand mechanisms to control organisational IT security Risk assessment √ Data protection Physical security

Computer Misuse Act 1990 Unauthorised access (section 1) intent to commit or facilitate commission of further offences (section 2) Unauthorised access with intent (section 2) intent to impair computer operation (section 3) Unauthorised modification (section 3) Making, supplying or obtaining articles for use in offence under section 1 or 3 Task: Look at the examples given: Real examples: Http://www.computerevidence.co.uk/Cases/CMA.htm Discuss: Why is this act significant to organisations?

site or system access criteria for personnel What principles would you apply? Draft a policy statement for MWS What systems will they have? Who will have access to the different systems? When will they have access to them? How will access rights be managed during day-to-day operations? e.g. when someone joins the company what access rights will they be granted? How will access rights be changed (granted or revoked)? You may reference good practice from other users but must quote them! OECD(Organization for Economic Co-operation and Development): Guidelines for the Security of Information Systems

anti-virus software What recommendations would you make in terms of anti- virus software for MWS? How would you manage it? What are the shortcomings of your recommendations? What are the advantages?

firewalls What recommendations would you make for managing the firewall? How should it be configured?

basic encryption techniques What does encryption mean? Prepare a presentation to explain a basic encryption technique? ((not Caesar Cipher) Explain: how to encrypt, how to decrypt and comment on the strength of the encryption.