Data Confidentiality. Learning Objectives: By the end of this topic you should be able to: discuss the need to keep data confidential explain how data.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
GCSE ICT Networks & Security..
POSSIBLE THREATS TO DATA
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Security Strategy. You will need to be able to explain:  Data Security  Data Integrity and  Data Privacy  Risks  Hacking  Denial of Service DOS.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
B.A. (Mahayana Studies) Introduction to Computer Science November March Safety and Security What are the main safety and security.
Computer Viruses.
Security, Privacy, and Ethics Online Computer Crimes.
Presented by: Luke Speed Computer Security. Why is computer security important! Intruders hack into computers to steal personal information that the user.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Data Security GCSE ICT.
Video Following is a video of what can happen if you don’t update your security settings! security.
Security. Introduction to Security Why do we need security? What happens if data is lost? –Wrong business decisions through lack of information –Long-term.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
BUSINESS B1 Information Security.
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
Staying Safe Online Keep your Information Secure.
Section 6 Theory Software Copyright, Viruses and Hacking.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Chapter 13 Understanding E-Security. 2 OBJECTIVES What are security concerns (examples)? What are two types of threats (client/server) Virus – Computer.
1 Higher Computing Topic 8: Supporting Software Updated
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
ICT Homework- ICT Security Consultant PowerPoint.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Computer security By Isabelle Cooper.
1 Network and E-commerce Security Nungky Awang Chandra Fasilkom Mercu Buana University.
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Network Security & Accounting
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
W elcome to our Presentation. Presentation Topic Virus.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
Policies and Security for Internet Access
Any criminal action perpetrated primarily through the use of a computer.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Computer Security Sample security policy Dr Alexei Vernitski.
ASHRAY PATEL Protection Mechanisms. Roadmap Access Control Four access control processes Managing access control Firewalls Scanning and Analysis tools.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Information Systems Design and Development Security Precautions Computing Science.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Technical Implementation: Security Risks
8 – Protecting Data and Security
Teaching Computing to GCSE
G061 - Network Security.
Presentation transcript:

Data Confidentiality

Learning Objectives: By the end of this topic you should be able to: discuss the need to keep data confidential explain how data confidentiality can be achieved;

Learning Objective: By the end of this topic you should be able to: discuss how the following can be used to protect data: –encryption, –authorisation, –authentication, –virus checking, –virus protection, –physical security

Learning Objective (G061 synoptic) –physical security, –firewalls, –backup, –encryption, –biometric security, –software patches/updates, –‘anti-virus’ & anti- spyware software, –access rights, –auditing, –education of users, –user IDs, –passwords –methods for ensuring passwords remain effective explain methods for combating ICT crime and protecting ICT systems:

Confidentiality is my data safe? can I trust who has access to my data? is my data correct? can I be sure that my data will not be passed on? Example: bank account information is highly confidential –however, on-line banking takes place through the Internet  an open network  prone to attacks by hackers

Why does data need to be kept confidential? 1.to comply with the Data Protection Act –personal data must be kept secure –personal data must not be revealed 2.organisational reasons –information maybe commercially sensitive  details of new products or procedures of value to competitors

Encryption What is Encryption? the process of disguising messages or data –‘scrambling’ data –so that only the intended recipient can understand them –if data accessed unlawfully, it will be meaningless to unauthorised user involves data being ‘arithmetically transformed' before transmission in a scrambled form. –uses a random process set up using a special key value –the data is then decoded at receiver  by reversing the encryption process.

Encryption Why use Encryption? to provide security of data –especially during transmission through the Internet –where it is liable to interception. so that sensitive data cannot be understood by criminals –credit card details, s to ensure that data of a sensitive nature can only be accessed by those for whom data is intended –to maintain privacy to protect important data that might be hacked or stolen –music CD, movie DVD, digital TV

Authorisation giving permission (authority) for users to access data different users are allowed to access different data –and/or perform different operations on data

Authorisation: Levels of Access 1.may want to restrict access to data –only certain users can access the data –so that unauthorised changes are not made 2.data is commercially valuable –could be stolen or damaged/modified 3. legal restrictions on the access to personal data –DPA

Authorisation: Levels of Access there are four main levels of access rights to data: –Read Only: a user is allowed to view data –Create: a user is allowed to create new data records –Write: a user is allowed to make changes to data –Delete: a user is allowed to delete data to gain authorisation, a user must identify themself usually by entering a user name (User ID) other methods of supplying User IDs include: –such as a magnetic stripe on the back of a card, –a smart chip on a card, – biometric: voice recognition, finger print, retina scan ….

Authorisation: User IDs Why? allow access to user areas –stop unauthorised access –protect data to make individual users members of groups –allow access to files based on access rights –allow access to resources – printers, software to be able to monitor use –audit logs to comply with the law –DPA

Authorisation: User IDs Effectiveness of user ID maintained by: must be unique –so can be sure who is doing what can be suspended when user is away –on holiday, leaves the company (or infringes code of conduct) can be linked to resources –an individual machine –software applications –times of use

Authentication “the process of determining the identity and legitimacy of a user or process” –confirming that a user is who they say they are Why: authorisation only tells the computer who the user is authorisation does not prevent somebody from pretending to be a different person need a 2 nd level of identification

Authentication 3 main ways for authenticating individuals: 'Something you know' – password, PIN 'Something you have' –mobile phone, credit card or hardware security token 'Something you are' –biometric: voice recognition, fingerprint, retinal scan ….

Authentication: Password Effectiveness of password maintained by: 1.Network Manager: –force password change frequently –enforce minimum length password –enforce unrecognisable words only (not in dictionary) –must contain numbers and letters (& punctuations) –cannot reuse passwords –3 incorrect password attempts  account is locked 2.User: –not writing password down –make it something others can’t guess – not personal –make sure no one is looking when you type it in

Viruses a program which infects computer systems by self- replicating (copying itself to other systems) computers can be infected by viruses when new data is introduced to the computer: –removable media: USB storage devices, memory cards, CD-R, DVD-R –across a network: LAN, via the Internet infection by a virus can: –cause harm to data on a computer –collect information about a user without the user’s knowledge (spyware)

Boot Sector Viruses spreads by hiding itself in the boot sector your hard drive or floppy disk. when your computer reads an infected floppy disk, the virus is copied from the disk to your computer's memory. any new disk, CD or memory stick inserted in the computer will then become infected if this storage medium is used on another computer – it becomes infected ……

Virus contained in attachments to messages, replicates itself by automatically mailing itself to people in the victim's address book. spreads very rapidly

Trojan a computer program program claims to do one thing but instead does damage when you run it –delete files, erase hard disk opens your computer up to malicious intruders, allowing them to read your files appears to be friendly – but isn’t!

Macro Virus many applications now have their own built-in programming language (macro language) –Microsoft Office applications use Visual Basic infects word processor files, spreadsheets, databases … can spread quickly –if a Word file is sent via –file used by many people. Microsoft added protection into later versions of Word, –now receive a warning about infected documents.

Virus Protection install anti-virus software on all computers scan storage devices for infected files –detects viruses –allows removal of infected code from file –deletion of infected files regularly update virus data files install firewall on network –hardware or software prevent use of removable storage media –CDs, DVDs –USB devices - memory stick, removable HDD

Audit Logs consist of data about each stage of any transaction, logs are maintained automatically by the system allow the network manager to examine patterns of use audit logs track: –who did what, –at which workstation, –when it occurred. logs can be used to see which member of staff: –accessed particular files –other resources – web pages.

Firewall network security device –stands between a network and the outside world –can either be hardware and/or software based. –examines data packets moving into and out of the system. configured to permit or deny connections –using a set of rules –access is denied if not allowed by the rules –rules set using the organization's security policy  configured by the system administrator –checks data sent by users and applications –filters websites users are permitted to visit

Why use a Firewall? prevents external users from gaining unauthorised access to a computer system limits/filters the data that can be received or sent to external users could block certain types of data to protect data from being viewed/altered/deleted to comply with the Data Protection Act to stop hackers/viruses from entering the system January 2007

Physical Security lock the computer up entry measure to get into building disconnect (or remove) floppy/CD/DVD drives disconnect USB ports (memory sticks/portable HDD)