Protecting Data and Information

Slides:



Advertisements
Similar presentations
POSSIBLE THREATS TO DATA
Advertisements

BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Factors to be taken into account when designing ICT Security Policies
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Data Security GCSE ICT.
Chapter 11 Security and Privacy: Computers and the Internet.
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
1.1 System Performance Security Module 1 Version 5.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Data Security.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Information Systems Design and Development Security Precautions Computing Science.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
START. A room full of computers Two or more computers connected together in order to communicate A computer that can communicate with every living thing.
Hardware and software that can provide a good level of security In this presentation I am going to provide advices on hardware and software that needs.
Chapter 15 Digital Citizenship Section 15.1 Communicating in a Digital Society.
Technical Implementation: Security Risks
8 – Protecting Data and Security
Security Issues in Information Technology
Chapter 40 Internet Security.
Learning Intention Legislations impact on security of information
Securing Information Systems
Explaining strategies to ensure compliance with workplace legislation
What they are and how to protect against them
Common Methods Used to Commit Computer Crimes
Instructor Materials Chapter 7 Network Security
Handling Personal Data
Security and Administration Transparencies
Systems Security Keywords Protecting Systems
Legislation in ICT.
Lecture 5. Security Threats
Network security threats
Lesson Objectives Aims You should be able to:
Business Risks of Insecure Networks
GCSE ICT Revision Topic 2: Connectivity.
Answer the questions to reveal the blocks and guess the picture.
Big Picture How many ways can a system be attacked? What can we do about it?
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Protect Your Computer Against Harmful Attacks!
Unit 1.6 Systems security Lesson 3
LO2: Understand Computer Software
Malware, Phishing and Network Policies
Shopping experience! Avoiding online fraud Ian Ramsey C of E School
Security of People, Property and Information
Network and Internet Security and Privacy
Part 3.
HOW DO I KEEP MY COMPUTER SAFE?
Legislation in ICT.
How it affects policies and procedures
BTEC level 3 Learning Aim D.
BTEC level 3 Learning Aim C.
Communicating in the IT Industry
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Protecting Data and Information BTEC learning Aim E Protecting Data and Information

Pre topic task Make a list of threats to a computer. Make a list of how to protect against these threats. Write a short paragraph on why you think businesses see protecting data as important.

Keywords Malware – software created to steal data by gaining access to an IT system without users consent Router – an electronic device that enables data transmission between devices

Characteristics of threats to data You need to understand the importance of keeping data secure. Think about how you put your data at risk and how businesses can put their data at risk. Obvious and disclosing passwords or using the same login for multiple devices Leaving devices open to others (not locking computer when leaving workstation) Posting information globally Using personal devices for business operations

Activity Research these threats listed below and find out: What they are. What they affect How could they be used How can they be protected Viruses and malware Hackers Phishing Accidental damage Extension – What is auto save and how can it be a beneficial feature.

How can this have an impact on individuals and organisations Consider what data an individual has and how it can be stolen, manipulated or deleted. What impact would this have? Organisations If data is leaked or used against an organisation consider the implications on their reputations and the relatability of the business.

Protecting data We now know that business will spend a lot of money on protecting data. Think in more detail in how and why they do this. File permissions Access levels Backup and recovery procedures Passwords Physical access control Digital certificates protocols

Activity What are the features, characteristics and implications to anti-virus software?

Antivirus software Antivirus software is designed to search out and stop attempts to corrupt the system. Depending on the software your antivirus system will either: Scan in real time any files that are saved or opened Perform deep and full scans and check entire storage devices (periodically) Heuristic analysis (look for ‘virus like’ activity) Research the virus databases The more your system is exposed the greater the risk to your system Constant scanning and checking for viruses can affect the CPU and the system and slow down the PC

Research In your group pick 2 antivirus software packages each and compare: Price Features Versatility Implications Impact on other software 1 2 3 4 5 6 Price Features Versatility Implications Impact on other software Score ( / 10)

Firewalls What is a firewall? Controls and manages the incoming and outgoing network traffic based on the security rules. Software applications (stored locally (not on the network)) Hardware based (part of the router) Firewalls use a variety of methods to protect data including: Basic port blocking Advanced stateful packet inspection (SPI) Research these methods and write them in your book.

Encryption Research what encryption is and list some methods for encrypting data. What are the implications? If the code key if forgotten (data cannot be decrypted) How is the key shared (risks to security) Data is vulnerable when it is being transmitted, consider paying for items across the internet, sending emails, sending personal data. Encryption is essential to ensure that during the transmission process data is secure. Web pages use https to encrypt, emails use PGP to be encrypted. However when performing a bank transactions data is encrypted and decrypted so that the bank information is protected. If the holder of the information takes a break during the transaction the data is accessible to others during this time. So it is advisable to avoid disruptions and using public devices for such transactions.

What does legislation aim to stop? Hackers Fraud and theft Copyright infringement Abuse Cyberbullying Trolling Indecent images harassment

Legislation Research: Legislation What does it protect? What are the consequences for breaching? Data protection Act 1998 Computer Misuse Act 1990 Freedom of Information Act 2000

Legislation Research some case studies where these acts have been broken in real life and explain what happened. What is the impact on individuals and organisations? Data Protection Act – data is not shared without the permission of the individual it relates too. There are eight principles to the data protection act. Everyone is entitled to read their own medical record and the records held about you by the place of study (e.g. school). However there are certain exceptions to this. Staff or individuals in charge of entering data must be aware of any consequences arising from storing the data. The freedom of information act has affected public bodies as if the public request to see the data they must release it, the idea of this act was to ensure greater transparency to government bodies but over the years it has revealed surprising data which has led to legislative change. E.g. the MPs expenses issues.

Protection of data It is vital for individuals and organisations that data is protected via different methods, some of these are: File permissions – password protection on certain files and folders Access levels – certain users are allowed to access certain systems or apps Backup and recovery procedures – data must be backed up regularly in case of a disaster, most systems often have automatic backup procedures. Passwords – computers and logins should be kept secret and shouldn’t be easy to guess. Physical access control – leaving the computer or device unattended and unlocked exposes you and your data Digital certificates - these are unique codes which helps to identify a transaction, such as a bank statement. Protocols – this is the agreement between devices, secure data relies on some form of encryption, protocols allow the devices to communicate and transfer data. TASK – using these areas above draw a flowchart on how an organisation can protect data.

Codes of practice for the protection of data Information commissioners office (UK) and professional bodies in intended to ‘uphold information rights in the public interest by promoting openness by public bodies and data privacy for individuals’. The ICO provide guidance and interpretation of legislation. Small business may use leaflets to explain data protection but larger organisations may have an employee who is named as the data controller and deals with the process of personal information (HR). The Crown Prosecution service will become involved when breaches to data occur. Professional bodies will have codes of practice which must be followed to ensure legislation is not broken,

Exam style question