Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

POSSIBLE THREATS TO DATA
Security Strategy. You will need to be able to explain:  Data Security  Data Integrity and  Data Privacy  Risks  Hacking  Denial of Service DOS.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
Security, Privacy, and Ethics Online Computer Crimes.
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Factors to be taken into account when designing ICT Security Policies
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
The laws Organizations are covered by lots of different laws
Administrative Practices Outcome 1
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Protecting ICT Systems
Disaster Planning and Security Policies. Threats to data DeliberateTerrorism Criminal vandalism/sabotage White collar crime Accidental Floods and fire,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
General Purpose Packages
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Stuart Cunningham - Computer Platforms COMPUTER PLATFORMS Computer & Network Security & User Support & Training Week 11.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
1 I.Assets and Treats Information System Assets That Must Be Protected People People Hardware Hardware Software Software Operating systems Operating systems.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
IT Security for Users By Matthew Moody.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
1.1 System Performance Security Module 1 Version 5.
Security and backups GCSE ICT.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
ICT Homework- ICT Security Consultant PowerPoint.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Data Security.
Viewing Information Systems Security. The basic objectives of Information Security are the same as the basic objectives of EDP auditing. They are: 1.To.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Cmpe 471: Personnel and Legal Issues. Personnel Crime is a human issue not a technological one Hiring On-going management Unauthorised access Redundancy.
Communication in Administration (Security)
By Liam Wright Manga comic group Japan SAFETY on your computer.
ICT Security Policies Security Policies What is Security?What is a policy? The aims or plan of action of a person or group. School OED Precaution against.
Physical security By Ola Abd el-latif Abbass Hassan.
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Unit 12 – IT Technical Support – Anne Sewell Aims of the lesson: To carry out a back-up of files to a USB or desktop. This is a build-up exercise towards.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Computer Security Sample security policy Dr Alexei Vernitski.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Welcome to the ICT Department Unit 3_5 Security Policies.
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
8 – Protecting Data and Security
Explaining strategies to ensure compliance with workplace legislation
Unit 13 IT Systems Troubleshooting and Repair Anne Sewell
Handling Personal Data
Administrative Practices Outcome 1
Managing the IT Function
Security of People, Property and Information
Data Security GCSE ICT.
Planning and Security Policies
Security of Data  
G061 - Network Security.
Presentation transcript:

Protecting Data

Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc

Threats to computer systems Data Integrity Fraudulent use / Malicious Damage Viruses

Data Integrity The correctness of data –Data may become incorrect or corrupted during: Data Entry Errors in operating procedure (update program x2) Program Errors

Improving data integrity Data entered by authorised personnel only Data must be verified Output should be checked for reasonableness Printed output should be shredded after use

Protecting Data Write-Protect disks Each user has an ID & Password –Password at least 6 characters & contain 1 number –Password display surpressed –Files that contain passwords must be encrypted –Confidential passwords –Regular password changes

Access Rights Only see data needed –Doctor see own patients –Doctors receptionist not see medical history Only make changes if authorised Only certain stations make changes –Password only changed at specific machine

Access Rights (2) DataAccess RightTerminalTimesSecurity Level Customer IDRead Only04, Credit LimitRead Write PaymentRead / Write04, Credit RatingNo Access

Fraudulent Use! Vett Employees Immediate removal of sacked employed Separation of duties (more than 1 person involved in a process) Use of passwords (allows audit trail)

Fraudulent Use (2) Educate Staff –Challenge visitors –Shred output –Log-off –Lock doors –Employ a security manager to monitor staff & terminals and log statistics.

Virus Protection Make sure all software is sealed before use Do not allow floppy disks (This will also prevent unauthorised data removal) Scan for viruses (disallow attachments?) Run regular anti-virus software scans (make sure your virus definitions are up to date)

Physical Security Prevention of access to computer areas (cards, badges, locks) Visitors to wear badges CCTV Alarm Systems

Security Procedure Use a floppy drive lock Use a virus check Do not allow anyone else to use your computer (even at home) Back-up regularly

Biometric Security Passwords only as effective as their owner! –Written Down –Blu-tacked to the monitor –Obvious (name, dob, password) Fingerprint Iris Scanners

Other Problems Fire Flood Power surge Accidental damage The deliberate damage we have been talking about

Newer problems! Internet –Snooping / Hacking –Microsoft code loss!! –Theft of data –Viruses –Time Wasting

Disaster Planning No matter what precautions are taken, things will go wrong! –Backup (see later in the course) –Recovery Plan Identify alternative computer equipment Restore data Identify alternative office space Make provision for alternative communication links