SECURITY Of the five basic elements of an Information System, DATA is our main concern in relation to security practices.

Slides:



Advertisements
Similar presentations
HIPAA Security Standards Emmanuelle Mirsakov USC School of Pharmacy.
Advertisements

BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
1 3. Data Protection and Privacy Reference: Discovering Computers 2003/2004 Course Technology, Thomson Learning Chapter 12 Note: The privacy laws in HK.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
Locking the Backdoor: Computer Security and Medical Office Practice Dr. Maury Pinsk, FRCPC University of Alberta Division of Pediatric Nephrology.
BIOMETRICS AND NETWORK AUTHENTICATION Security Innovators.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
PGP An example of Public Key Encryption software.
Security Security is critical in the storage and transmission of information loss of information can not only cause problems to the organisation but can.
Chapter 9 Information Systems Controls for System Reliability— Part 2: Confidentiality and Privacy Copyright © 2012 Pearson Education, Inc. publishing.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Marjie Rodrigues
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
Authentication Approaches over Internet Jia Li
Chapter 10: Authentication Guide to Computer Network Security.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
General Purpose Packages
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Jim McLeod MyDBA  SQL Server Performance Tuning Consultant with MyDBA  Microsoft Certified Trainer with SQLskills Australia 
BUS1MIS Management Information Systems Semester 1, 2012 Week 7 Lecture 1.
Data Confidentiality. Learning Objectives: By the end of this topic you should be able to: discuss the need to keep data confidential explain how data.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
BUSINESS B1 Information Security.
Security and backups GCSE ICT.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Chapter-2 Identification & Authentication. Introduction  To secure a network the first step is to avoid unauthorized access to the network.  This can.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Encryption Objective 1: Explain data encryption procedures.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
Information Systems Security
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
McGraw-Hill/Irwin ©2008 The McGraw-Hill Companies, All Rights Reserved INFORMATION SECURITY SECTION 4.2.
UNIT 19 Data Security 2.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Network Security & Accounting
Identification Authentication. 2 Authentication Allows an entity (a user or a system) to prove its identity to another entity Typically, the entity whose.
INTRODUCTION TO BIOMATRICS ACCESS CONTROL SYSTEM Prepared by: Jagruti Shrimali Guided by : Prof. Chirag Patel.
Access Control / Authenticity Michael Sheppard 11/10/10.
Physical security By Ola Abd el-latif Abbass Hassan.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
Unit 32 – Networked Systems Security
Physical Security Concerns for LAN Management By: Derek McQuillen.
Computer Security Sample security policy Dr Alexei Vernitski.
Information Systems Design and Development Security Precautions Computing Science.
( ) 1 Chapter # 8 How Data is stored DATABASE.
RACHELLE BERRY COLLECTING INFORMATION TO PROVIDE SUPPORT TO CUSTOMERS.
7/10/20161 Computer Security Protection in general purpose Operating Systems.
Technical Implementation: Security Risks
8 – Protecting Data and Security
DATA SECURITY FOR MEDICAL RESEARCH
Security of People, Property and Information
Security of Data  
Module 2 OBJECTIVE 14: Compare various security mechanisms.
PLANNING A SECURE BASELINE INSTALLATION
Computer Security Protection in general purpose Operating Systems
G061 - Network Security.
Presentation transcript:

SECURITY

Of the five basic elements of an Information System, DATA is our main concern in relation to security practices.

Monitoring and controlling its flow of information deals particularly with the storage, retrieval and communication phases of information processing. It is the procedures and equipment that are used in these phases that is under scrutiny when looking at enhancing the security of your system.

Why protect and guard data? Data is processed into information and information keeps all parts of an organisation informed and running smoothly. Information is an asset. It can be bought, sold, stolen, eradicated and modified. It has value.

How is value put on information? REPLACEMENT COST How much would it cost to replace the information? What repercussions will the loss have on the business?

SENSITIVE NATURE Exposure of client details could cause a loss of goodwill for the company and harm those involved. Such information is deemed “ sensitive ”.

CONTEXT It is difficult to put value on information since the value can change when a new policy is constructed. The same data can have a higher value to one user than to another.

LEGAL Some data must remain unchanged for a given number of years, due to legal requirements. Receipts, invoices, bill and tax data must be kept for 5 years.

Data Collection Methods DATA WAREHOUSING: a term that now applies to large organisations that accumulates databases and accounting details of clients. Storage must contain accurate and complete data in order for data mining to take place.

DATA MINING: a term that refers to the analysis of data within a warehouse (a hard disk or a server). Specialists will examine the data for trends in purchasing or trading among certain businesses

DATA CREEP: This refers to the process of data being gathered and then used for other purposes.

The information produced from the data is of use to managers for operational decisions, tactical decisions and strategic decisions. Thus all organisations must decide what data is valuable and why.

Limiting access to data Access Control Methods Doors with locks Restricted access to the room that houses the server and access to the server is password protected

Backup tapes, disks ( CDR, CDRW, ZIP ) are locked away Original software CD ’ s or disks are locked away Shredder

Authentication and Identification Methods IDENTIFICATION – the method of saying to the organisations that you are a member of that organisation. Eg by username AUTHENTICATION – the manner in which an individual establishes the validity of their identity.

There are 3 methods of authentication. Something you know eg a combination to a lock, PIN Something you possess eg a swipe card, smart card Something you are eg fingerprint, voice pattern

Password procedures Length: password choices must be at least 6 keystrokes and alphanumeric Selection: Password cracking dictionaries will analyse passwords as they are passed to the server Ageing: users need to change their passwords at regular intervals. Eg of a decent password: aL1Cb#2R2aD

Equipment employed to limit access Biometrics – Finger printing, iris scanning, voice recognition, face recognition and palm prints arc the main biometrics. Biometrics is strong because the identification method is part of the individual. Ie it can ’ t be stolen easy.

Limitations of Biometrics Iris Scanning – terrifies people when they learn a ‘ laser ’ beam is used to scan iris. People with physical disorders eg Parkinson ’ s Disease, can ’ t hold their head still, for long enough to take the scan. Voice Recognition – common cold could change the voice quality. Fingerprints – can be duplicated – although it ’ s hard to do

Procedures to enhance security of data Network Level security procedures: Network software can hide or restrict access to groups of users or individual users. It can allow users viewing rights to files and directories, editing rights to given files and delete rights.

Storage security procedures Storage includes the use of company – accepted file names and areas of storage.

Backup Methods as Security What files are backed up? (How important are they? Critical, important, Routine? ) How often are they backed up? Every 20 minutes at places like casinos or once a day? What method? On what medium?

Backup Hardware A UPS is an Uninterruptible Power Supply, which is a deep discharge battery that can keep the power on for a given period of time. Other backup hardware: Magnetic tape cartridges, CD-R, CD-RW, zip disk, etc.

Communication procedures Companies communicate their information in- house by printer, monitor, , and fax phone. It ’ s very easy for information to get lost, damaged or stolen by careless procedures. Users must be educated never to leave workstations unattended or leave important information on the monitor, in printer trays or fax trays.

Encryptions There are 2 types Single Key Encryption: Documents can be sent safely over a network, etc when they ’ re encrypted first. Simple one-way encryption is by the use of password protection. The same password is used to read the document upon receipt.

Public Key Encryption – this method requires a public key and a private key. The public key is given to those who wish to send files, and a private key is used to decrypt the sent files. The private key is controlled by one person and is not transmitted is any form.

Stenography This is another method used to secure contents of documents. Using specialised software, text files are hidden inside larger, inconspicuous files such jpg and wav files. The data bits in the text file replace the least significant data bits in the larger file, The larger file will be altered but the differences will be negligible to the human eye.