Download presentation
Presentation is loading. Please wait.
Published byDarren Shelton Modified over 9 years ago
1
Data Integrity and Security
2
Data integrity data that has a complete or whole structure a condition in which data has not been altered or destroyed in an unauthorized manner
3
Wiretapping any interception of a telephone transmission by accessing the telephone signal itself
4
Electronic eavesdropping the use of an electronic transmitting or recording device to monitor conversations without the consent of the parties
5
Who can legally monitor phone conversations? Federal law enforcement officials may tap telephone lines only after showing "probable cause" of unlawful activity and obtaining a court order must limit the surveillance to communications related to the unlawful activity and to a specific period of time, usually 30 days Electronic Communications Privacy Act, 18 USC 2516
6
How does a cordless phone communicate? Cordless phones operate like mini- radio stations. They send radio signals from the base unit to the handset and from the handset back to the base. These signals can travel as far as a mile from the phone's location
7
CELLULAR TELEPHONES Cellular phones send radio signals to low-power transmitters located within "cells" that range from one block to 20 miles across As you travel from cell to cell, the signal carrying your voice is transferred to the nearest transmitter
8
Data encryption the coding (scrambling), of the data before it is transmitted over the communication link Decryption is the decoding (descrambling), of the received data.
9
Algorithm An algorithm is a set of instructions, in this case for scrambling the data A key is a set of specific codes to be used by the algorithm to perform the encryption
10
Protect yourself in data communications Keep your system software and patches up to date A personal firewall Keep your anti-virus software up to date Turn off any services you don't need Least secure: Wireless networking
11
Video Video
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.