Download presentation
Presentation is loading. Please wait.
Published byAugust Patterson Modified over 6 years ago
1
Data security OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013
2
Data security Businesses such as supermarkets must make sure that the data they hold is kept safe and secure. UserIDs and passwords Access rights and permissions Physical security Encryption and https OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013
3
Passwords Passwords are used for security purposes, as only the correct user should know the password that goes with the userID. Passwords should not be written down and should be changed regularly, should not be related to the user so they can’t be guessed, should have at least 6 characters and should contain a mixture of characters. A secure password can be generated here: OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013
4
User IDs A userID, or user identity, or user name, for an account is used to identify the user to the computer system so that the correct access rights and files are made available when the account is accessed. UserIDs are usually easy to remember and related to the person e.g. the name or address of the person. Only the password needs to be kept secret because access to the account is not possible without the password. OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013
5
Access rights and permissions
Access to files stored on computer systems can be adjusted to control who can read, write, alter, save or delete the file. Access rights can be used to restrict access to certain employees. Setting access rights in Windows 7 Access rights in Linux OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013
6
Setting access rights in Microsoft Windows
Access rights can be set in Microsoft Windows 7 via the ‘properties’ tab of a file: Who can use the file is set here Detailed control of actions What actions are available Advanced control OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013
7
File and folder permissions in e.g. Linux
The access rights to a folder are set by adjusting the permissions on the folder. These are folders on a server: There are three groups of letters: the first is for the owner of the folder, the second is for the group to which the owner belongs, and the last is for all other users. d means this is a directory or folder, r means that the folder can be read, w means that the folder can be written to, x means that any files can executed or run by the user. OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013
8
Physical security Locks on doors and windows are obvious security measures. Other measures include: locking computer equipment away when not needed using security locks on the doors to computer rooms or offices using security cables to lock e.g. laptops to a desk the use of security cameras to monitor computer rooms guards to prevent unauthorised access to computer rooms OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013
9
Using security cables Security cables can be used to lock e.g. laptops or other equipment to a desk. OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013
10
Using security cameras
Security cameras can monitor the activities in a computer room as well as other areas in the company offices; the output of the cameras can be watched by security staff. OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013
11
Unauthorised access Guards can help to prevent unauthorised access to computer rooms. OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013
12
Security locks on doors
Security locks can be fitted to doors so that only those with the correct code can enter. Some security locks can be accessed using a key fob with an RFID tag inserted. Identity badges can have RFID tags inserted to allow access to certain areas. OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013
13
Encryption Encryption scrambles data using an encryption key so that it cannot be understood unless it is decrypted. This prevents unauthorised users from being able to understand the data. Be ready at 7.30! TG& Q?>!VT WX 1 2 3 4 5 Same encryption key used to unscramble message Message written Encryption key used to scramble message Scrambled message sent Encrypted message Be ready at 7.30! 6 Message can be read OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013
14
HTTPS Https is ‘hypertext transfer protocol secure’ and is used for secure communication over networks providing authentication of a website and the encryption of the data being transferred to and from the website. This is an example of https: https shows in the URL A padlock is shown in the browser OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.