Presentation is loading. Please wait.

Presentation is loading. Please wait.

Data Security.

Similar presentations


Presentation on theme: "Data Security."— Presentation transcript:

1 Data Security

2 Why is data security important?
Data security is important for several reasons: Information systems cannot perform the function unless data is accurate and complete. A lot of information is very sensitive such as personal data, medical data, credit card information and banking details to name a few.

3 What are the main threats to data loss or corruption?
Computer hackers can steal or destroy data. Computer viruses can destroy data. Spyware can be used to steal data. Unauthorised access to data by employees (privacy!) Hardware or software malfunction. Disaster such as fire.

4 Data protection methods.
1. Backups Backups can be employed to make copies of data stored in an information system. Different types of backups include: Online backups Offsite backups Real time backups Partial backups Grandfather/father/son backuops

5 Data protection methods.
2. Login/Logout procedures Users of an information system must authenticate themselves using a unique username and password. A log is kept of the times a user is on the system and also a record of the users activity.

6 Data protection methods.
3. Security software (anti-virus, anti-spyware and firewalls) These applications are essential in protecting a system from web based threats. These programs need to be updated on a regular basis as new threats are created every day.

7 Data protection methods.
4. Data Encryption Is a mathematical process that converts data into a code that is difficult to break. There are many forms of data encryption but in this course we will mainly concern ourselves with internet based encryption methods such as Secure Socket Layer (SSL)

8 Data protection methods.
5. Biometrics A form of user authentication that uses a persons physical characteristics such as fingerprints, face recognition and voice recognition. This is relatively new technology but in the future will be the primary method used for authentication.

9 Data protection methods.
6. Levels of Access Is related to the rights of the individual users of a system. Each user depending on who they are can access specific data. For example, within our school: student medical information cannot be accessed by all teachers. Only year advisors, deputy principals and the principal can access this data. Student data cannot be changed by teachers. Only the front office staff can perform this task.


Download ppt "Data Security."

Similar presentations


Ads by Google