1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Debit Card Plastic card that looks like a credit card
HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Prepared by: Nahed Al-Salah
1 UNIT 20 The ex-hacker Lecturer: Ghadah Aldehim.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Chapter 3 – Computer Hardware Computer Components – Hardware (cont.) Lecture 3.
Introduction to Networks Networking Concepts IST-200 VWCC 1.
Internet safety By Lydia Snowden.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Security Equipment Equipment for preventing unauthorised access to data & information.
Prepared by:Nahed AlSalah Data Security 2 Unit 19.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
UNIT 14 Lecturer: Ghadah Aldehim 1 Websites. Introduction 2.
By: Dwayne Burl.  The Central Processing Unit (CPU) is responsible for interpreting and executing most of the commands from the computer's hardware and.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Network and Internet Security and Privacy.  Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying.
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Dr. Walaa Nasr.  By the end of this lecture the students will be able to identify :  Computer system  Hardware and its contents  Software  Networks.
Networked Information Systems 1 Advantages of and classified by their size & architecture or design.
Chapter 2: Information Technology and AISs
Security and backups GCSE ICT.
Data management in the field Ari Haukijärvi 2nd EHES training seminar.
INFO1 – Practical problem solving in the digital world
1. MAGNETIC HARD DRIVES 2. SOLID STATE DRIVES 3. OPTICAL DISKS 4. FLASH MEMORY 5. CLOUD STORAGE 6. CONNECTIVITY DEVICES Storage and connectivity devices.
Computer Literacy BASICS
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Chapter 01: Introduction to Network Security. Network  A Network is the inter-connection of communications media, connectivity equipment, and electronic.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
UNIT 19 Data Security 2.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Lesson 8—Networking BASICS1 Networking BASICS Managing a Local Area Network Unit 2 Lesson 8.
Transferring data.  Most commercial computer users need to allow their employees to share data.  It also needs more than one employee to access the.
FIT03.05 Explain features of network maintenance.
Computer Basics SystemsViruses Alternative Input Speech.
Obj. 1.03: Discuss the security and confidentiality issues and ethics-related to data, hardware and software.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
CPT 123 Internet Skills Class Notes Internet Security Session B.
KEYBOARDING 1 Computer Basics. Definitions Computer  An electronic, digital, programmable machine that has four functions  accepts input  processes.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Networks. What is a Network? A network is a collection of computers and other devices that allow computer users to send and receive information to and.
Security Issues and Ethics in Education Chapter 8 Brooke Blanscet, Morgan Chatman, Lynsey Turner, Bryan Howerton.
Foundation year Lec.4: Lec.4: Communication Software Internet & Security Lecturer: Dalia Mirghani Year : 2014/2015.
Information Systems Design and Development Security Precautions Computing Science.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
RECORDS MANAGEMENT Judith Read and Mary Lea Ginn Chapter 12 Electronic Media and Image Records 1 © 2016 Cengage Learning ®. May not be scanned, copied.
START. A room full of computers Two or more computers connected together in order to communicate A computer that can communicate with every living thing.
WHAT IS A NETWORK TYPES OF NETWORK NETWORK HARDWARE
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
HOW WELL DO YOU KNOW THE BASICS OF USING YOUR COMPUTER?
SECURITY FEATURES OF ATM
UNIT 19 Data Security 2.
Operating Systems What are they and why do we need them?
Introduction to Computers
Network and Internet Security and Privacy
Part 3.
PLANNING A SECURE BASELINE INSTALLATION
G061 - Network Security.
The Computer’s Hardware
Bioinformatics (Nursing)
Presentation transcript:

1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim

Introduction 2

There are a variety of security measures that can be used to protect hardware and software including: 1)Controlling the physical access to hardware and software. 2)Backing up data and programs: storing a copy of files on a storage device to keep them safe. 3)Implementing network controls such as: A.Using passwords (a secret code used to control access to a network system).

B.Installing a firewall (a combination of hardware and software used to control the data going into and out of a network. It is used to prevent unauthorized access to the network by hackers). C.Encrypting data (protecting data by putting it in a form only authorized users can understand). Introduction

D.Installing a callback system ( a system that automatically disconnects a telephone line after receiving a call and then dials the telephone number of the system that made the call, to reconnect the line. It is used in remote access systems to make sure that connections can only be made from permitted telephone numbers). E.Using signature verification or biometric security devices. Introduction

4) Separating and rotating the computing functions carried out by employees and carrying out periodic audits of the system (observing and recording events on the network systematically). Introduction

5) Protecting against natural disasters by installing uninterruptible power supplies and surge protectors. battery backup systems that automatically provide power to a computer when the normal electricity source fails. Electronic devices that protect equipment from damage due to a sudden surge in a power supply Introduction

6)Protecting against viruses by using anti virus programs and ensuring that all software is free of viruses before it is installed. Particular care should be taken when using public domain software (freeware) and shareware. An anti-virus program is a program that checks files for virus coding instructions inside another program and can be used for removing any virus coding instructions detected. computer programs or sets of programs used to detect, identify and remove viruses from a computer system Introduction

A smart card is a plastic card containing a processor and a memory chip. It can be used to store large amounts of confidential data including coded data that can be used as digital cash. Electronic currency that is used for making electronic purchases over the Internet Introduction

It can also be used as a security device to prevent or allow access to a system and allow the user to withdraw cash from a bank ATM. Automatic Teller Machine- a type of machine used by banks for enabling customers to withdraw money from their bank accounts. Introduction

A smart card reader is a device used for reading smart cards by detecting radio signals emitted from a radio antenna in the form of a small coil inside the smart card. Introduction

Data is commonly stored on a LAN (Local Area Network) by attaching storage devices to a server. Common storage devices include tape drives, RAID and optical devices such as CD-Roms. A computer that provides a network service A set of hard disks that work as one unit Introduction

In large networks, server farms are used. The storage devices are often attached using a connection standard known as SCSI (Small Computer Systems Interface) LANs with larger storage needs can add NAS (Networked Attached Storage) devices. They attach to the LAN and are available to all systems on the LAN without needing to be attached to a server computer. Large collections of networked server computers that work together by sharing the service workload Introduction

The biggest network systems can also use a SAN (Storage Area Network). This is a storage network that uses high speed copper or fiber optic connections such as Fiber Channel (a high speed interconnection standard). The SAN is a separate network that is interconnected to the main LAN. It is therefore available to all LAN users and can be centrally managed. Introduction