SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

Computer Fraud Chapter 5.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Business Risks How much of a risk are you willing to take? Going out on a limb.
Crime and Security in the Networked Economy Part 4.
9 - 1 Computer-Based Information Systems Control.
Security, Privacy, and Ethics Online Computer Crimes.
Chapter 14 System Controls. A Quote “The factory of the future will have only two employees, a man and a dog. The man will be there to feed the dog. The.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Factors to be taken into account when designing ICT Security Policies
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 14 Managing Information Systems and Technology.
Copyright © 2015 Pearson Education, Inc. Processing Integrity and Availability Controls Chapter
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Protecting ICT Systems
Disaster Planning and Security Policies. Threats to data DeliberateTerrorism Criminal vandalism/sabotage White collar crime Accidental Floods and fire,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Lead Black Slide Powered by DeSiaMore1. 2 Chapter 14 Managing Information Systems and Technology.
1.1 System Performance Security Module 1 Version 5.
Operations Security Lisa M. True, CISSP January 12, 2004 Domain 7.
Security and backups GCSE ICT.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Information Systems Security Operational Control for Information Security.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
ICT Homework- ICT Security Consultant PowerPoint.
Zulhizam Bin Ebrahim Mohd Shamir Bin Abd Azia Muhammad Salehin Bin Suhaimi
Verification & Validation F451 AS Computing. Why check data? It’s useless if inaccurate. Also, wrong data: Can be annoying Can cost a fortune Can be dangerous.
Data Security.
Commercial Data Processing Credit. Management Information CDP makes it easier for managers to control and process the information that is needed in the.
Security and Backup. Introduction A back-up strategy must cover all eventualities: Accidental damage Equipment failure Deliberate damage It must consider:
Network Security & Accounting
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chap1: Is there a Security Problem in Computing?.
Cmpe 471: Personnel and Legal Issues. Personnel Crime is a human issue not a technological one Hiring On-going management Unauthorised access Redundancy.
Communication in Administration (Security)
CONTROLLING INFORMATION SYSTEMS
The aim of producing a backup strategy is to make sure that a computer system can be returned to its original state if data has been lost or corrupted.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Verification & Validation
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Welcome to the ICT Department Unit 3_5 Security Policies.
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
Unit 13 IT Systems Troubleshooting and Repair Anne Sewell
AS ICT Module 2 Objectives: Security of Data
UNIT 19 Data Security 2.
Processing Integrity and Availability Controls
Managing the IT Function
Planning and Security Policies
Backup and restoration of data, redundancy
Security of Data  
G061 - Network Security.
Presentation transcript:

SECURITY OF DATA By: ADRIAN PERHAM

Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to ensure the safety of IT systems; Everything you need to know about backups and recovery procedures. Enjoy……………………….. OBJECTIVES

ISSUES OF PRIVACY Details of property, vehicles, accidents, claims, health etc. Hold insurance details INSURANCE COMPANIES Salary details, income and withdrawals, direct debits etc. Hold financial details BANKS Credit card payments, account history, items purchased etc. Hold payment details STORES Address, age, qualifications, payment details etc. Hold personal records EMPLOYERS EXAMPLES DESCRIPTION

Crime WAYS IN WHICH I.T. SYSTEMS RISK Abuse Natural disaster Human error

DATA INTEGRITY (i.e. the correctness of the data) ERRORS ON INPUT… ERRORS IN OPERATING PROCEDURE… PROGRAM ERRORS COULD LEAD TO CORRUPTION OF FILES…

STANDARD CLERICAL PROCEDURES INPUT (i.e. data entry): OUTPUT: It MUST be limited to authorised personnel; Data may have to be inputted twice; Data control totals MUST be used. All output SHOULD be inspected; Sensitive information SHOULD be shredded after use.

WRITE-PROTECTING DISKS

USER IDs & PASSWORDS COMMON RULES ISSUED BY COMPANIES: Passwords - at least 6 characters long; Password display – automatically suppressed; Files containing passwords MUST be encrypted; Users MUST NOT disclose their password(s); Users MUST change their password regularly.

ACCESS RIGHTS Authorised personnel don’t have the right to all the information on a database; Access rights to some data could be set to either ‘Read-Only’, ‘Read/Write’ or ‘No Access’; Computers can be programmed to allow access to particular data only from certain terminals, or only at certain times of day.

Careful vetting of prospective employees; SECURING AGAINST FRAUDULENT USE OR MALICIOUS DAMAGE Immediate removal of sacked/resigning employees, and cancellation of all their passwords & authorisations; ‘Separation of duties’; Card reading machines, badges, or any other types of locks; Passwords to gain access to different parts of the the computer system; Educating staff on possible breaches of security; Educate staff to be alert of preventing or reporting these breaches of security; Appointing a security manager; Using special software which can monitor all terminal activity;

PROTECTION AGAINST VIRUSES Making sure all purchased software is sealed and inside tamper- proof packaging Not permitting any floppy disks containing software or data to leave or enter the office Using anti-virus software

BIOMETRIC SECURITY MEASURES Fingerprint recognition; Voice recognition; Face recognition; Iris recognition;

COMMUNICATIONS SECURITY Vulnerable to hackers PROBLEM: PREVENTIONS: Call-back procedure Data encryption

DISASTER PLANNING About 70% of organisations that experience a failure cease operating within 18 months. Fire Flood Power failure Malice Loss of business THIS IS DUE TO: Loss of credibility Cash flow interruptions Poorer service to customers Loss of production

PERIODIC BACKUPS WEAKNESSES: All updates to a file - the last backup may be lost The system may need to be shut down during backup operations Creating backups can be time consuming Recovery from the backup can be even more time consuming BENEFITS: Files which may have been fragmented can be reorganised ONE BACKUP COPY SHOULD BE STORED IN A FIRE-PROOF SAFE IN THE BUILDING, AND ANOTHER COPY OFF-SITE

BACKUP STRATEGIES 1. Copy all the files from the computer onto a tape or removable disk… 2. Store data files in separate directories from the software… 3. Incremental backup…

BACKUP HARDWARE Floppy disks:1.44Mb Zip drive:100Mb disks Super disk drives:120Mb disks and 1.44Mb floppy disks Magnetic tape:2Gb – 8Gb tape cartridges CD-RW:650Mb – 800Mb rewriteable CDs RAID (Redundant Array of Inexpensive Disks)

BACKING UP ON-LINE DATABASES These devices simultaneously save the data to several different disks. Generally, three copies are made; two in the same room, and one from an external location. R.A.I.D. (REDUNDANT ARRAY OF INEXPENSIVE DISKS Info about every updating transaction is recorded on a separate TRANSACTION FILE. ‘Before’ and ‘After’ images are saved. If the disk fails, a new backup can be made. TRANSACTION LOGGING

FACTORS IN BACKUP STRATEGIES Frequency of backups… Backup medium… Location of backup storage… Number of generations to be kept… Responsibility for implementing the backup strategy… Testing of recovery procedures…

RECOVERY PROCEDURES Identify alternative compatible equipment Identify alternative compatible security facilities Implement a service agreement Have provision for alternative communication links