Security Equipment Equipment for preventing unauthorised access to data & information.

Slides:



Advertisements
Similar presentations
AS ICT. Identify suitable uses of common storage media understand the types of access and access speeds required for each use (e.g. serial/sequential,
Advertisements

Term Project Grade 9 Section B Due december 18 Find and research one Emerging technology not studied in class. It can be a prototype or already available.
Lecture 6 User Authentication (cont)
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
By: Monika Achury and Shuchita Singh
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Network Administration Procedures Tools –Ping –SNMP –Ethereal –Graphs 10 commandments for PC security.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Storage Chapter 3.
Chapter 3: Storage Devices & Media ALYSSA BAO 1. 2 Solid State controls movements of electrons within a microchip Optical uses precision lasers to access.
STORAGE DEVICES AND MEDIA BY: T.MINH. Backing Up Data Refers to the copying of files and data to different medium in case of problem with the main storage.
Distinguish between primary and secondary storage.
New Data Regulation Law 201 CMR TJX Video.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
By: Piyumi Peiris 11 EDO. Swipe cards are a common type of security device used by many people. They are usually a business-card-sized plastic card with.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
Day 10 Hardware Fault Tolerance RAID. High availability All servers should be on UPSs –2 Types Smart UPS –Serial cable connects from UPS to computer.
Essential Computer Concepts
Data Confidentiality. Learning Objectives: By the end of this topic you should be able to: discuss the need to keep data confidential explain how data.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Secondary Storage Chapter 7.
Storage Devices. Internal / External Hard Drive Also known as hard disks Internal drive stores the operating system software, application software and.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
Networking Two or more computers linked together so that it is capable of sending messages between them. Network Stand Alone Computer.
Chapter 2: Information Technology and AISs
CMPTR Chapter 2 – Part 2 (Storage). Storage – Punch Cards Player Piano Roll Punch Cards were used before disk drives.
INFO1 – Practical problem solving in the digital world
Chapter 16 Designing Effective Output. E – 2 Before H000 Produce Hardware Investment Report HI000 Produce Hardware Investment Lines H100 Read Hardware.
Module 2: Information Technology Infrastructure Chapter 1: Hardware and Software.
1. MAGNETIC HARD DRIVES 2. SOLID STATE DRIVES 3. OPTICAL DISKS 4. FLASH MEMORY 5. CLOUD STORAGE 6. CONNECTIVITY DEVICES Storage and connectivity devices.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Security Issues and Strategies Chapter 8 – Computers: Understanding Technology (Third edition)
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
INFORMATION MANAGEMENT Unit 2 SO 4 Explain the advantages of using a database approach compared to using traditional file processing; Advantages including.
McLean HIGHER COMPUTER NETWORKING Lesson 15 (a) Disaster Avoidance Description of disaster avoidance: use of anti-virus software use of fault tolerance.
Biometrics Authentication Technology
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Topic 5: Basic Security.
Security and Backup. Introduction A back-up strategy must cover all eventualities: Accidental damage Equipment failure Deliberate damage It must consider:
Security fundamentals Topic 11 Maintaining operational security.
FIT03.05 Explain features of network maintenance.
Biometrics Chuck Cook Matthew Etten Jeremy Vaughn.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Install, configure and test ICT Networks
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Hands-On Microsoft Windows Server 2008 Chapter 7 Configuring and Managing Data Storage.
LEARNING AREA 1 : INFORMATION AND COMMUNICATION TECHNOLOGY PRIVACY AUTHENTICATION VERIFICATION.
ICT Unit 3 Storage Devices and Media. What is backing up of data? Backing up refers to the copying of file to a different medium It’s useful if in case.
By Molly.  Definition: refers to the copying of files/data to a different medium.  Why back up data? - To safe against loss of data. - To safe against.
Network-Attached Storage. Network-attached storage devices Attached to a local area network, generally an Ethernet-based network environment.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
UNIT V Security Management of Information Technology.
Computer Note.
Processing Device and Storage Devices
Managing Multi-User Databases
Storage devices and media
UNIT 19 Data Security 2.
Choosing the best storage method
Biometrics Reg: AMP/HNDIT/F/F/E/2013/067.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
GCSE OCR 4 Storage Computer Science J276 Unit 1
G061 - Network Security.
Presentation transcript:

Security Equipment Equipment for preventing unauthorised access to data & information

Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human recognition: Physical traits unique to each individual Biometric scanning: whereby biometric measurements are collected and integrated into a computer system. Used for two purposes: –identification, “Do I know you”, one-to- many match –authentication “Are you who you claim to be”, 1-1 match

Biometrics contd Biometric devices: –Voice recognition –Fingerprint recognition –Hand geometry –Signature verification –Facial recognition –Iris recognition

Biometrics contd Advantages: –recognition based on an intrinsic aspect of a human –non-intrusive data collection –no or minimal contact between person and scanning equipment –automated –high accuracy, high speed –minimal training

Biometrics contd Disadvantages; depending on type of technology –need for close physical contact with scanner –user acceptance, intrusiveness of technology –expense of system –memory intensive storage requirements –Common biometric devices: Voice recognition; fingerprint recognition; hand geometry; signature verification; facial recognition; iris recognition.

Equipment, Swipe Cards Swipe Cards –Electronic transactions; eg. credit cards, ATM cards –Internal security within organisation, also hotels –Limitation: Easily damaged by magnetic fields If stolen, little protection

Equipment, Smart Cards Smart card, –embedded microchip which stores and manipulates data, eg. telstra telephone card, photocopy cards, Myki public transport ticketing system Security tokens –Two-factor authentication; enter a/ct name & p/word and authentication code on security token –If lose token can’t access data either Mobile phone secure code –Authentication occurs when a security code is sent to the account holder’s mobile phone to authenticate a transaction before it actually occurs.

Equipment, Power protection Surge protector – protects electrical equipment against overvoltage caused by a power surge UPS, used in server rooms; –high quality surge protector & battery; –Protect data if there is an undercurrent or complete power failure –As soon as loss of power to UPS, batteries begin to supply power

Strategies for avoiding system failure Redundancy, no single part of the system is critical to its overall operation; if one part fails, the others, hard drives or mirrored machines take over; also know as fault tolerant systems 1Redundancy through multiple hard drives Continuously copy data onto a second, “mirrored” hard drive; if main drive fails, then a duplicate set of data is available on mirrored drive Use of a RAID system; data spread over several hard drives; requires a controller and disk drives 2Redundancy through mirrored servers More expensive than above b/c requires extra hardware

Equipment, Backup media Operating systems contain built-in-backup utility In deciding which device to use consider: –Cost of drive or writer –Cost of media per MB or GB –Speed & –Compatibility –Issue of support in years to come

Storage media & memory, terms of cost & speed

Equipment, Backup media Magnetic Media –Hard disk drive, any size; common in schools –Magnetic tape Relatively cheap but slow to save & restore files, sequential access. Optical Drives –CD ROM, (700 mb); DVD, 17 gb double sided –Blu-ray, 50gb (dual layer); 5 times more storage than DVD and allows high definition films to be stored. Solid-state drives –USB storage devices; convenient, no moving parts, less chance of breakdown, store 2 gb of data

Equipment, Online backups Use of remote servers via internet –Orgnisations want to consolidate storage & backup systems to ensure they work with access to fault tolerant servers, UPS, etc. Enterprise storage systems –Use of a storage area network, (SAN) of RAID disks, tapes, CD/DVD-ROM servers, internet backups & other networked storage devices

Enterprise storage system

Surveillance technology Packet sniffers, (for internet & ) –Diagnostic tools monitoring contents of data sent across networks –Used to monitor & internet usage Desktop monitoring programs –See what is on the desktop –All tasks are logged –Hackers use these applications Log Files –Webservers record every URL accessed, web browsers store webpages, networks, etc.

Surveillance technology CCTV Telephones Audit Trails –Log files of system logins –Files accessed modified or copied

Security, Physical security devices Lockable disk box Safe or specialised room Security cables attached to items