Data Security.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

Primary Threats to Computer Security
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Chapter 4 McGraw-Hill/Irwin Copyright © 2011 by The McGraw-Hill Companies, Inc. All rights reserved. Ethics and Information Security.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Security, Privacy, and Ethics Online Computer Crimes.
The Internet = A World of Opportunities
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Factors to be taken into account when designing ICT Security Policies
Computer and Ethics. Ethical Problems Proliferation of computers and their networks have created new ethical problems The ACM has issued a Code of Ethics.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Security Measures Most governments use Secure Sockets Layer(SSL) on their websites. It creates a secure link between the user’s browser and the government’s.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
Protecting ICT Systems
Disaster Planning and Security Policies. Threats to data DeliberateTerrorism Criminal vandalism/sabotage White collar crime Accidental Floods and fire,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
IT Security for Users By Matthew Moody.
BUSINESS B1 Information Security.
1.1 System Performance Security Module 1 Version 5.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
Security and backups GCSE ICT.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Security Squad Keeping your Equipment and Information Safe Security Squad Keeping your Equipment and Information Safe Security Squad Video Series, Part.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
Files are at risk from loss if your computer breaks or if you get a virus. Files can also become corrupted. Solutions: Make regular back ups of files Use.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
ICT Homework- ICT Security Consultant PowerPoint.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Computer Security By: Alex Metzler. Table of Contents Protecting Your Personal Info Know Who You’re Dealing With Use Updated Security Software Update.
Last Minute Security Compliance - Tips for Those Just Starting 10 th National HIPAA Summit April 7, 2005 Chris Apgar, CISSP – President Apgar &
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Keith Bower. What is Internet Security  Internet security is the protection of a computer's internet account and files from intrusion of an outside user.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Policies and Security for Internet Access
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
8 – Protecting Data and Security
Security Of Information Systems
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Encryption and Hacking
Unit 4 IT Security Kerris Davies.
How it affects policies and procedures
G061 - Network Security.
Presentation transcript:

Data Security

Why is data security important? Data security is important for several reasons: Information systems cannot perform the function unless data is accurate and complete. A lot of information is very sensitive such as personal data, medical data, credit card information and banking details to name a few.

What are the main threats to data loss or corruption? Computer hackers can steal or destroy data. Computer viruses can destroy data. Spyware can be used to steal data. Unauthorised access to data by employees (privacy!) Hardware or software malfunction. Disaster such as fire.

Data protection methods. 1. Backups Backups can be employed to make copies of data stored in an information system. Different types of backups include: Online backups Offsite backups Real time backups Partial backups Grandfather/father/son backuops

Data protection methods. 2. Login/Logout procedures Users of an information system must authenticate themselves using a unique username and password. A log is kept of the times a user is on the system and also a record of the users activity.

Data protection methods. 3. Security software (anti-virus, anti-spyware and firewalls) These applications are essential in protecting a system from web based threats. These programs need to be updated on a regular basis as new threats are created every day.

Data protection methods. 4. Data Encryption Is a mathematical process that converts data into a code that is difficult to break. There are many forms of data encryption but in this course we will mainly concern ourselves with internet based encryption methods such as Secure Socket Layer (SSL)

Data protection methods. 5. Biometrics A form of user authentication that uses a persons physical characteristics such as fingerprints, face recognition and voice recognition. This is relatively new technology but in the future will be the primary method used for authentication.

Data protection methods. 6. Levels of Access Is related to the rights of the individual users of a system. Each user depending on who they are can access specific data. For example, within our school: student medical information cannot be accessed by all teachers. Only year advisors, deputy principals and the principal can access this data. Student data cannot be changed by teachers. Only the front office staff can perform this task.