Download presentation
Presentation is loading. Please wait.
1
Security of Data
2
Understand the importance of, and the mechanisms for, maintaining data security, describing the distinction between security and privacy. Understand simple processes that protect the integrity of data against malicious or accidental alteration, e.g., standard clerical procedures, passwords, levels of permitted access, write protect mechanisms, backup procedures, restoration and recovery procedures. Understand the need for regular and systematic backup and procedures for recovery.
3
Privacy & Security Privacy is to do with personal data, organisations keeping personal data on individuals must not allow this data to be disclosed to anyone not entitled to see it. The Data Protection Act of 1998. Security is to do with any data that is kept and used with a computer, and how that data is protected from harm from theft and sabotage, or from loss by fire, flood, or other disasters.
4
Non Disclosure and Official Secrets Act
Terms of contract place restrictions on employees during and sometimes after they have left employment. Done to protect valuable organisational information being made public or being disclosed to a rival organisation. The Official Secrets Act is an extension of the non disclosure agreement as it is an Act of Parliament, therefore employees are legally bound. It is normally for the protection of the state and its citizens. Military personnel, Civil servants, the police etc may be bound by the Official Secrets Act.
7
Privacy Personal data should be kept private.
Many organisations collect personal data from us. Use of the telephone is monitored for who/where we call. Use of the Internet is monitored for websites we visit. Loyalty cards record what we buy in the supermarket.
8
What Does Safeburys know about our eating habits?
What alcohol do we drink? What brand of cigarette do we smoke? What meat do we eat, is it beef? What vegetarian food do we eat? What bulk buys we make for savings? What pet food do we buy? What baby food do we buy? What brand of cereal do we eat? How do we pay for it? What details do you think a supermarket would keep on its database?
9
Other ways of Collecting Data
How can data be collected by: Using a Credit card Using a Mobile ‘phone Using the Internet Walking around a high street store Driving along a motorway Travelling to France for the day Apply for a job?
10
Threats to Security Theft of hardware, software, files, data.
Malicious destruction / alteration of the above by staff. Innocent mistakes leading to destruction / alteration of the above by staff. Destruction by natural disasters, floods etc. Destruction by fire. Destruction by loss of electricity.
11
Threats to Security Hardware malfunction, software programming errors.
Hacking, virus attacks, espionage, terrorist attacks. Unauthorised entry from an outside source for fraud or other illegal activity. Employees withdrawal of labour through strikes or other industrial action.
12
Access to Data and Backup
Keeping data secure involves restricting the access to data using physical barriers and logical controls. Physical barriers mean a control of who may enter the building or room. Logical controls mean using the software on the computer to restrict entry or access to anyone attempting to do something without the authority to do so. Keeping data safe from loss involves keeping a backup copy of the data in a different place.
13
Physical Access Control
Secure the building by: reducing the number of entrances, use alarms and sensors on entrances / exits, security guards, reception guard to log in visitors, and to issue badges to staff and visitors, restrict access to computer rooms or data storage areas using code keys or cards, newer systems may use biometric data such as a finger print scanner, or an iris laser scanner.
14
Automatic Access Control
Access is controlled so that only authorised personnel are allowed entry. A device is fitted to a door instead of a security guard or a key lock. This device could be a key pad combination lock, or a variety of other devices shown.
15
Security Measures ID Swipe Card Lock Security Camera Biometric Reader
16
Computers Measures can be made to restrict the chances of theft of computers. Do not allow visitor areas in the same room as computers. Do not allow computers to be seen from outside the building. Do not allow staff to borrow equipment. Use a device to lock the computer casing to the work desk. Use a lock or a disabling device when the computer is not being used.
17
Logical Access Control
These are used to restrict access to certain files of data and to software. When access to the computer is allowed, this type of control is done by software. Control is achieved by use of: User identities, Passwords, Restrictions to parts of the Operating System, Encryption of files that are sent electronically.
22
Network Security All networks need a Network Manager to be responsible for the safety of software and data. Much of the security is done using Logical Access Controls. Other measures could include: Different access rights from user ID, Passwords are minimum length and changed regularly, Incorrect attempts to log in restricted to only three, Regular back up of personal files on the server.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.