Catholic University College of Ghana Fiapre-Sunyani INFORMATION TECHNOLOGY I Audrey Asante, Faculty of ICST Data Protection and Security Computers and.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
The Internet Crime Kathi Subramaniyam CS-403. Overview Internet crime Types of Crime Security features Future.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
Unit 18 Data Security 1.
© Paradigm Publishing, Inc. 8-1 Chapter 8 Security Issues and Strategies Chapter 8 Security Issues and Strategies.
Security, Privacy, and Ethics Online Computer Crimes.
4/15: Security & Controls in IS Systems Vulnerabilities Controls: what to use to guard against vulnerabilities –General controls –Application controls.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Created by Dragon Lee May Computer Virus What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys.
Definitions  Virus A small piece of software that attaches itself to a program on the computer. It can cause serious damage to your computer.  Worm.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Video Following is a video of what can happen if you don’t update your security settings! security.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Chapter 11 Security and Privacy: Computers and the Internet.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Introduction to Information Technology: Your Digital World © 2013 The McGraw-Hill Companies, Inc. All rights reserved.Using Information Technology, 10e©
Essential Computer Concepts
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
The Utility Programs: The system programs which perform the general system support and maintenance tasks are known as utility programs. Tasks performed.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
1 What is a computer virus? Computer program Replicating Problematic "Event" Types Detection and prevention.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
Backup Procedure  To prevent against data loss, computer users should have backup procedures  A backup is a copy of information stored on a computer.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
For more notes and topics visit: eITnotes.com.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
What is computer virus? Computer virus refers to a program which damages computer systems and/or destroys or erases data files.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
SECURITY ISSUES, ETHICS, AND EMERGING TECHNOLOGIES IN EDUCATION CHAPTER EIGHT PRESENTATION Brock Williams William Cravey Amber Couch Erin Lynn Mullins.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Using Information Technology
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
All about viruses, hacking and backups By Harriet Thomas.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chap1: Is there a Security Problem in Computing?.
VIRUS.
n Just as a human virus is passed from person from person, a computer virus is passed from computer to computer. n A virus can be attached to any file.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Chapter 8 Security Issues and Ethics in Education By: Nick, Bryan, Randa, Austin.
Storage, Communication & Disposal of data & information Threats to data & Information Deliberate, accidental & technical failure.
Security and Ethics Safeguards and Codes of Conduct.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Page 1 Viruses. Page 2 What Is a Virus A virus is basically a computer program that has been written to perform a specific set of tasks. Unfortunately,
Information Systems CS-507 Lecture 32. Physical Intrusion The intruder could physically enter an organization to steal information system assets or carry.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
Technology in Action Chapter 9 Securing Your System: Protecting Your Digital Data and Devices Copyright © 2013 Pearson Education, Inc. Publishing as Prentice.
Presentation on Computer Virus
UNIT 19 Data Security 2.
THREATS IT in HOTEL INDUSTRY Pertemuan 8
WHAT IS A VIRUS? A Computer Virus is a computer program that can copy itself and infect a computer A Computer Virus is a computer program that can copy.
Securing your system, protecting your digital data and devices.
Presentation transcript:

Catholic University College of Ghana Fiapre-Sunyani INFORMATION TECHNOLOGY I Audrey Asante, Faculty of ICST Data Protection and Security Computers and law Work Ergonomics

DATA PROTECTION AND SECURITY Safe guarding of information. Taking precautions to prevent the loss or misuse of information or data. Access control: unauthorized access to an individual or company’s information. Some of the precautions are – Encryption – Use of password, PIN (personal identification number), digital signatures, physical traits (biometrics), call-back system blocking all who have passwords – Physical access (locking with padlocks), cards, keys, signatures, badges

Protection of software and data Control of access: online file accessible to only legitimate users Audit controls: tracking of programs and servers in use People control: screening of job applicants (resumes). Also, separate of employee functions. Manual and automated controls-input controls, processing controls and output controls-are used to check that data is handled accurately and completely during the processing cycle. Printouts can be discarded or disposed by shredding or in locked trash barrels.

Disaster-recovery plans Is a method of restoring information processing operations that have been halted by destruction or accident. Host site is a fully equipped computer center, with everything needed to resume functions. A cold site is a building or other suitable environment in which a company can install its won computer system

Measures to Data Loss Master files: updating a file periodically. It is also advisable to store the three most recent updates. Direct-Access files: Backing up of files and any update should affect the back up. Fire proof safes used to store files Write protection mechanism on disks or tapes especially the diskette

SECURITY ISSUES Threats to computers and communication systems – Errors and Accidents – Natural and other hazards – Crime against computers and communications – Crime using computers and communications – Worms and viruses – Computer criminals

Errors and Accidents Human errors: people can complicate the workings of a system in three ways – Humans often are not good at assessing their own information. Thus, for example, many users will acquire a computer ad communications system that either is not sophisticated enough or is far more complex than they need. – Human emotions affect performance – Humans act on their perception, which in modern information environments are often too slow to keep up with the equipment. You can be overwhelmed by information overload, for example, that decision making may be just as faulty as if you had too little

Procedural errors Software errors (software bugs) Electromechanical problems: mechanical systems such as printers and electrical systems, such as circuit boards, don’t always work. They may be improperly constructed, get dirty or overheated, wear out, or become damaged in some other way. Power failures can shut a system down. Power surges can burn out equipment. In the digital age, normal accidents will not be rarities but are to be expected.

Dirty data problems: dirty data is data that is incomplete, outdated, or otherwise inaccurate. You should have a look at your records so you can make any corrections to them before they cause you complications.

NATURAL AND OTHER HAZARDS Natural hazards: fire, floods, earthquakes Civil strife and terrorism

Crime against computers and communications Two ways, illegal act perpetrated against computers and communications or the use of computers or telecommunications to accomplish an illegal act. Crimes against IT include theft-hardware, software, time and services, information, crime of malice and destruction

COMPUTER CRIMINALS Employees Outside users Hackers and crackers Professional criminals

Computer Virus A piece of software that replicate and transfer itself from one computer to another, without the user being aware of. Some are harmless, others destroy or damage data. A worm is a program that copies itself repeatedly into memory or onto a disk drive until no space is left. More malicious than a virus

Mode of Transmission By secondary storage device By network

TYPES OF VIRUSES Boot-Sector Virus: Affect the boot sector files and rather loads itself before the operating system. Example: AntiEXE, Ripper, Monkey. File Virus: Attaches itself to executable files. When the program is run, the virus starts working, trying to get into the main memory and infecting other files

Types of Viruses Logic Bombs: they differ from other viruses, they are set to go off a certain date and time. Maybe to erase an inventory system at a given time and date. Trojan Horse: covertly places illegal, instructive instructions in the middle of a legitimate program. Example is FormatC.

READ Computers and law Work Ergonomics