Presentation is loading. Please wait.

Presentation is loading. Please wait.

Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.

Similar presentations


Presentation on theme: "Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers."— Presentation transcript:

1 Protection of Data 31 Protection of Data 31

2 Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers Access Levels Passwords Anti-virus software Firewall Encryption Backup & Recovery Privacy Settings

3 Protection of Data 31 Simply means protection such as locks on doors, or CCTV & even turning computers off at night Physical Barriers

4 Protection of Data 31 A strong password is at least 8 characters and includes uppercase & lowercase letters plus numbers and symbols Strong passwords create a random mix of character that’s hard to guess or ‘crack’ Cyber criminals use special programs to ‘crack’ passwords by trying masses of possible combinations Such programs can try on average over 8 billion password combinations each second Passwords

5 Protection of Data 31 Passwords Strong or Weak? apple toffeeapple ToffeeApple123 7 Tofple 5 7_tofPle5: At least 8 characters: upper/lower letters & numbers PLUS punctuation and symbols.

6 Protection of Data 31 Means people only have access to the parts of the system they need In a business, that will depend on their job role Staff would also need training before gaining greater access Access Levels

7 Protection of Data 31 Software that works by scanning your files & then deleting a virus or put it safely in quarantine There are lots of different brands of anti- virus software But whatever you use, it must be kept up-to-date because new viruses are released all the time Anti-Virus Software

8 Protection of Data 31 Anti-Virus Software

9 Protection of Data 31 Means software that monitors data packets coming in and out of a network to protect it from viruses, malware and hackers. It puts a ‘wall’ around a network and stops any data traffic that’s trying to use unauthorised channels Firewall

10 Protection of Data 31 Firewall Communication Channels ‘Ports’ HTTP Port 80 SMTP Port 25 Malicious Communication

11 Protection of Data 31 Firewall HTTP 80 SMTP 25

12 Protection of Data 31 Firewall LAN

13 Protection of Data 31 Means scrambling data to turn it into a secret code before sending it over a network, or the Internet so hackers can’t decode & understand it This is especially important for sensitive personal details being sent across the Internet, such as from bank websites That’s why https is now so important Encryption

14 Protection of Data 31 Encryption Intercept packets Called ‘packet sniffing’ Can collect passwords etc

15 Protection of Data 31 Encryption

16 Protection of Data 31 A backup is a copy of data kept in a different location. Don’t forget the different location! Recovery is replacing the data, such as copying the backup files Backup & Recovery

17 Protection of Data 31 Security settings can be used on social networking sites to protect users’ privacy. Privacy Settings

18 Protection of Data 31 Protection of Data 31

19 Protection of Data 31 Protection of Data 31


Download ppt "Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers."

Similar presentations


Ads by Google