Protecting Data
Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc
Threats to computer systems Data Integrity Fraudulent use / Malicious Damage Viruses
Data Integrity The correctness of data –Data may become incorrect or corrupted during: Data Entry Errors in operating procedure (update program x2) Program Errors
Improving data integrity Data entered by authorised personnel only Data must be verified Output should be checked for reasonableness Printed output should be shredded after use
Protecting Data Write-Protect disks Each user has an ID & Password –Password at least 6 characters & contain 1 number –Password display surpressed –Files that contain passwords must be encrypted –Confidential passwords –Regular password changes
Access Rights Only see data needed –Doctor see own patients –Doctors receptionist not see medical history Only make changes if authorised Only certain stations make changes –Password only changed at specific machine
Access Rights (2) DataAccess RightTerminalTimesSecurity Level Customer IDRead Only04, Credit LimitRead Write PaymentRead / Write04, Credit RatingNo Access
Fraudulent Use! Vett Employees Immediate removal of sacked employed Separation of duties (more than 1 person involved in a process) Use of passwords (allows audit trail)
Fraudulent Use (2) Educate Staff –Challenge visitors –Shred output –Log-off –Lock doors –Employ a security manager to monitor staff & terminals and log statistics.
Virus Protection Make sure all software is sealed before use Do not allow floppy disks (This will also prevent unauthorised data removal) Scan for viruses (disallow attachments?) Run regular anti-virus software scans (make sure your virus definitions are up to date)
Physical Security Prevention of access to computer areas (cards, badges, locks) Visitors to wear badges CCTV Alarm Systems
Security Procedure Use a floppy drive lock Use a virus check Do not allow anyone else to use your computer (even at home) Back-up regularly
Biometric Security Passwords only as effective as their owner! –Written Down –Blu-tacked to the monitor –Obvious (name, dob, password) Fingerprint Iris Scanners
Other Problems Fire Flood Power surge Accidental damage The deliberate damage we have been talking about
Newer problems! Internet –Snooping / Hacking –Microsoft code loss!! –Theft of data –Viruses –Time Wasting
Disaster Planning No matter what precautions are taken, things will go wrong! –Backup (see later in the course) –Recovery Plan Identify alternative computer equipment Restore data Identify alternative office space Make provision for alternative communication links