UNIT 19 Data Security 2.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

POSSIBLE THREATS TO DATA
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Stole it Straight from Wilkes County. Questions from 1.01.
Chapter 10: Data Centre and Network Security Proxies and Gateways * Firewalls * Virtual Private Network (VPN) * Security issues * * * * Objectives:
SECURITY Of the five basic elements of an Information System, DATA is our main concern in relation to security practices.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
Data Security GCSE ICT.
The Impact of Physical Security on Network Security
Video Following is a video of what can happen if you don’t update your security settings! security.
Hardware vs. Software Computer systems consist of both hardware and software. Hardware refers to anything you can physically touch. Keyboards, mice, monitors,
The Office Procedures and Technology
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Operating System Utility Programs & Stand-alone utility Programs.
Data Confidentiality. Learning Objectives: By the end of this topic you should be able to: discuss the need to keep data confidential explain how data.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
BUSINESS B1 Information Security.
Security and backups GCSE ICT.
Computer Parts There are many parts that work together to make a computer work.
Computer System Game 6511 Keyboarding
The Computer System Review Game Directions: 1.Read each of the following questions and corresponding answer choices. 2.Click on the answer that you think.
Chapter 8 Safeguarding the Internet. Firewalls Firewalls: hardware & software that are built using routers, servers and other software A point between.
© CCI Learning Solutions Inc. 1 Lesson 5: Basic Troubleshooting Techniques Computer performance Care of the computer Working with hardware Basic maintenance.
Software Software consists of the instructions issued to the computer to perform specific tasks. –The software on a computer system refers to the programs.
1. MAGNETIC HARD DRIVES 2. SOLID STATE DRIVES 3. OPTICAL DISKS 4. FLASH MEMORY 5. CLOUD STORAGE 6. CONNECTIVITY DEVICES Storage and connectivity devices.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Input By Hollee Smalley. What is Input? Input is any data or instructions entered into the memory of a computer.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Operating Systems Lesson Objective: Understanding the functions of an operating system. Learning Outcome: Answer some basic questions on operating systems.
Data Security.
COEN 350: Network Security Authentication. Between human and machine Between machine and machine.
Transferring data.  Most commercial computer users need to allow their employees to share data.  It also needs more than one employee to access the.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
INFORMATION TECHNOLOGY. RIGHT METHODS TO DEAL WITH THE COMPUTER  Screen’s brightness and position should be comfortable for your eyes.  Keyboard should.
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
Computer Basics SystemsViruses Alternative Input Speech.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY: SECURITY Taylor Moncrief.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
 Face to face  Oral  Written  Visual  Electronic Communication in Administration 2.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Systems Software. Systems software Applications software such as word processing, spreadsheet or graphics packages Operating systems software to control.
Computer Security Sample security policy Dr Alexei Vernitski.
Chapter SOFTWARE Are the programs which are written by different programming languages. These programs are: a series of instruction that tells.
Microsoft SQL is known as RDMS (Relational Database Management System) which is developed by Microsoft and is highly used at corporate and enterprise.
Information Systems Design and Development Security Precautions Computing Science.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
UNIT 19 Data Security 2.
Part 3.
Types of Software.
Operating Systems Tasks 04/04/2019.
G061 - Network Security.
Operating Systems Tasks 05/08/2019.
Presentation transcript:

UNIT 19 Data Security 2

Strarter 1 7 8 2 Reading

Reading 2 Use a virus protection programs. Password – protect programs and data with passwords which cannot easily be cracked. Make a full backups, which copy all files, periodically. Control access to hardware.

3 Reading

Reading 3 Incremental backups. Shareware. Uninterruptible. Compromise. Cracked. Encrypt. Firewall. Monitor (verb). Biometric. Periodic.

Language Work

1- The scanner finds a match for your fingerprint. What is the relationship between them 1- The scanner finds a match for your fingerprint. 2- the keyboard is unlocked. 3- You can use the PC. The way to link these sentences by : (Cause to - make - when clause - an if-sentences - therefore - with the result that )

OR The way to link these sentences by : (permits – allows) The keyboard is unlocked ,which allows /permits you to use the PC. OR The keyboard is unlocked , allowing /permitting you to use the PC.

OR The keyboard remains locked , preventing you ( from) using the PC. The way to link these sentences by : (prevent – stop ) The keyboard remains locked , preventing you ( from) using the PC. OR The keyboard remains locked , stopping you ( from) using the PC.

Language Work 4

Language Work 4 Accessing To have Allowing To buy Coiled Creates Causing To broadcast Allows To withdraw Get

Language Work 5

Language Work 5 When a user runs anti-virus software, the software checks files for virus coding. If coding is matched to a known virus in a virus database, a message is displayed to the user that a virus has been found. If the user removes the virus or deletes the infected file, the virus is prevented from spreading or causing further damage.

Language Work 5 When you approach a high-security network, key features of your face are scanned. If the system matches your features to a database record of authorised staff, your identity is verified allowing you to logon. If your identity is not verified, you are stopped from using the system.

Language Work 5 3. voice-activated computers without keywords will become more common .when the user wants to log on she speaks to the computer which matches her voice to database of voice patterns .if the user has a cold or sore throat she is allowed to use the system because stress and intonation patterns remain the same .

Problem Solving 6

Problem Solving 6 Eye Scanning: Person looks through eyepiece. Laser scans eye recording microscopic details. Computer translates data into a unique barcode. Hand scanning: Select the conversation language. Insert the credit card. Insert hand to be scanned. Database checks your hand print and then checks to make sure your ID matches that on the credit card.

Specialist Reading

Specialist Reading Ecommerce, online-transaction processing, databases. The amount of information that needs to be managed or stored on a network. Tape libraries, RAID disks, optical storage Multimedia Distance limitations Ethernet Throughput limitations due to bandwidth, lack of cohesion among storage devices i.e. managing the devices can prove challenging.

Specialist Reading Almost any modem server. Most PC midrange and mainframe platforms. By offloading many storage-related server tasks to the SAN and by better allocating storage recourses to servers. Copper cabling or fiber-optic cabe.

Specialist reading (part B): 1- line 74 2/ a iv, b vi, c I, d ii, e iii, f v 3/ a False, b True, c False, d False, e True, f False