Presentation is loading. Please wait.

Presentation is loading. Please wait.

Data Security GCSE ICT.

Similar presentations

Presentation on theme: "Data Security GCSE ICT."— Presentation transcript:

1 Data Security GCSE ICT

2 Network Security Physical security means that the hardware of the network is protected from theft and kept safe. Access security means that there is a limit to the amount of access a user has to the information held on the network. Data security means that there are measures taken to prevent the loss of data held on the system.

3 Data Security Confidential information must be kept securely
Only authorised personnel should have access to confidential information Pass ECDL4

4 Backing Up Data You should always back up your data on a regular basis
Keep a second copy of important files on a external hard drive, zip disk, USB flash solid state drive or magnetic tape and store it separately from your PC Your data is much more valuable than your computer equipment - it’s priceless You can protect your PC equipment with insurance, but this will not replace your data! Pass ECDL4

5 Backing Up Data Backups should have a schedule e.g. taken every hour, every day etc State what media you will save it on State where the backups are kept Specify how data can be recovered from backup

6 Archiving Archiving is a backup that is taken in case the original is lost. Archives are the backups that are not needed in the immediate short term but maybe required for future reference Instead of saving these files on computer it is better to save them on backing removable storage (as mentioned previously) and store them in a fireproof building away from the main site

7 Protecting data from accidental destruction
User errors – untrained users may accidently delete files or save work over other work Fire – use smoke alarms to detect fires early Flood damage – don’t locate computers on the ground floor Power loss – Use an auxiliary power supply that comes on when the main supply cuts out Test new software - so that it doesn’t crash the current system

8 Protecting data from deliberate destruction
Ensure authorisation levels are in place. Access rights so that people higher up the organisation can access more data. Also the rights could be restricted to read only access, allow deletion or read/write access. User names and passwords are in place to prevent unauthorised access. Passwords should be a mix of numbers, letters and symbols and changed regularly Use CCTV Use virus checkers to check information is not corrupted Firewalls to prevent hackers from accessing data from the internet Use biometric methods e.g. fingerprinting, retina scanning, face recognition

9 Encrypting and monitoring Software & Transaction logs
Encryption – is the process of coding files before they are sent over networks/internet to protect them from hackers. Also coding information on the pc so if the computer is stolen files cannot be read. Monitoring software monitors network usage for unusual activity e.g. entering lots of passwords to try and gain access, this would then lock them out of the network Transaction logs – they monitor usage and produce an audit trail e.g. a deleted file will have the date and time of deletion and which member of staff deleted it

10 Encryption Example When you put in your card or bank details the website converts these into code using an algorithm (a program written specifically to do this). So instead of transmitting your card details via your phone line to the store server it sends the encoded details instead. At the other end the receiving computers must have the same piece of software (algorithm) and a ‘KEY’. The ‘KEY’ is like a password which tells the system how to decode the information. In theory even if someone intercepts (steals) this data then they won’t be able to access your bank details as they don’t have the key.

11 Ways of protecting you and your computer and network
There are now many company's offering users different packages to protect and prevent your computer and or network. Most of theses packages detect, quarantine and delete infected files And some monitor the websites accessed and links to other servers and or networks.

12 Computer Viruses Viruses are small programs which are designed to cause damage to a computer or whole networks. They can delete files, programs etc They can also spy on your online use. Examples Trojans, boot sector, key logging software tracks what you are typing e.g. a password etc Your PC can catch a virus by sharing files on disks/CDs, viewing/downloading files on the web, USB flash drives and from attachments (these may contain EXE. Files) The only protection against this is having anti-virus software installed on your machine Pass ECDL4

13 Protection against viruses
Scan files for viruses before opening them Make sure you keep your antivirus software up to date – 300 viruses are released into the wild every month – it only takes one to wreak havoc on your computer. Run a scan regularly. If on broadband, install a firewall to keep hackers away from your personal data. These help to filter out unauthorised requests from outside users. Pass ECDL4

14 Malware Malicious software
Programs that can alter systems software to redirect it to other sites Take over your computer remotely Programs that make your computer run slow Programs that make your computer freeze or crash Pass ECDL4

15 Physical security for a network
As well as security software you will need to protect your network in more conventional ways i.e. lock and key. Fire protection- fire doors, smoke doors, fire proof safes est. Alarms-rooms containing the server should be alarmed Locks-all rooms with services inside and have limited recorded access to them Visibility-avoid putting computers on ground flour and where they are visible to passes bye


17 For a company being hacked into can have various consequences, some of which can be seen below
For personal users it can be just as serious but for other reasons!!

Download ppt "Data Security GCSE ICT."

Similar presentations

Ads by Google