Download presentation
Presentation is loading. Please wait.
Published byGiles Barnard Stephens Modified over 9 years ago
1
Catholic University College of Ghana Fiapre-Sunyani INFORMATION TECHNOLOGY I Audrey Asante, Faculty of ICST Data Protection and Security Computers and law Work Ergonomics
2
DATA PROTECTION AND SECURITY Safe guarding of information. Taking precautions to prevent the loss or misuse of information or data. Access control: unauthorized access to an individual or company’s information. Some of the precautions are – Encryption – Use of password, PIN (personal identification number), digital signatures, physical traits (biometrics), call-back system blocking all who have passwords – Physical access (locking with padlocks), cards, keys, signatures, badges
3
Protection of software and data Control of access: online file accessible to only legitimate users Audit controls: tracking of programs and servers in use People control: screening of job applicants (resumes). Also, separate of employee functions. Manual and automated controls-input controls, processing controls and output controls-are used to check that data is handled accurately and completely during the processing cycle. Printouts can be discarded or disposed by shredding or in locked trash barrels.
4
Disaster-recovery plans Is a method of restoring information processing operations that have been halted by destruction or accident. Host site is a fully equipped computer center, with everything needed to resume functions. A cold site is a building or other suitable environment in which a company can install its won computer system
5
Measures to Data Loss Master files: updating a file periodically. It is also advisable to store the three most recent updates. Direct-Access files: Backing up of files and any update should affect the back up. Fire proof safes used to store files Write protection mechanism on disks or tapes especially the diskette
6
SECURITY ISSUES Threats to computers and communication systems – Errors and Accidents – Natural and other hazards – Crime against computers and communications – Crime using computers and communications – Worms and viruses – Computer criminals
7
Errors and Accidents Human errors: people can complicate the workings of a system in three ways – Humans often are not good at assessing their own information. Thus, for example, many users will acquire a computer ad communications system that either is not sophisticated enough or is far more complex than they need. – Human emotions affect performance – Humans act on their perception, which in modern information environments are often too slow to keep up with the equipment. You can be overwhelmed by information overload, for example, that decision making may be just as faulty as if you had too little
8
Procedural errors Software errors (software bugs) Electromechanical problems: mechanical systems such as printers and electrical systems, such as circuit boards, don’t always work. They may be improperly constructed, get dirty or overheated, wear out, or become damaged in some other way. Power failures can shut a system down. Power surges can burn out equipment. In the digital age, normal accidents will not be rarities but are to be expected.
9
Dirty data problems: dirty data is data that is incomplete, outdated, or otherwise inaccurate. You should have a look at your records so you can make any corrections to them before they cause you complications.
10
NATURAL AND OTHER HAZARDS Natural hazards: fire, floods, earthquakes Civil strife and terrorism
11
Crime against computers and communications Two ways, illegal act perpetrated against computers and communications or the use of computers or telecommunications to accomplish an illegal act. Crimes against IT include theft-hardware, software, time and services, information, crime of malice and destruction
12
COMPUTER CRIMINALS Employees Outside users Hackers and crackers Professional criminals
13
Computer Virus A piece of software that replicate and transfer itself from one computer to another, without the user being aware of. Some are harmless, others destroy or damage data. A worm is a program that copies itself repeatedly into memory or onto a disk drive until no space is left. More malicious than a virus
14
Mode of Transmission By secondary storage device By network
15
TYPES OF VIRUSES Boot-Sector Virus: Affect the boot sector files and rather loads itself before the operating system. Example: AntiEXE, Ripper, Monkey. File Virus: Attaches itself to executable files. When the program is run, the virus starts working, trying to get into the main memory and infecting other files
16
Types of Viruses Logic Bombs: they differ from other viruses, they are set to go off a certain date and time. Maybe to erase an inventory system at a given time and date. Trojan Horse: covertly places illegal, instructive instructions in the middle of a legitimate program. Example is FormatC.
17
READ Computers and law Work Ergonomics
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.