Primary/secondary data sources Health and safety Security of Data Data Protection Act.

Slides:



Advertisements
Similar presentations
Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Advertisements

GCSE ICT Networks & Security..
Primary Threats to Computer Security
POSSIBLE THREATS TO DATA
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Implications and Security Issues of the Internet By Neelesh Patel.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Security, Privacy, and Ethics Online Computer Crimes.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Administrative Practices Outcome 1
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Stuart Cunningham - Computer Platforms COMPUTER PLATFORMS Computer & Network Security & User Support & Training Week 11.
IT security Sherana Kousar 11a/ib1  A virus is a file written with the intention of doing harm, or for criminal activity  Example of viruses are: 
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
IT Security for Users By Matthew Moody.
1.1 System Performance Security Module 1 Version 5.
Section 6 Theory Software Copyright, Viruses and Hacking.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
Files are at risk from loss if your computer breaks or if you get a virus. Files can also become corrupted. Solutions: Make regular back ups of files Use.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Network problems Last week, we talked about 3 disadvantages of networks. What are they?
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
ICT and the Law: We are going to look at 3 areas.  The Copyright, Design, and Patents Act controls Illegal Copying  The Computer Misuse Act prevents.
Network Security & Accounting
Internet Safety Internet Safety LPM
Safety and Security issues of using ICT Alys brooks.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Cyber Safety Jamie Salazar.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Understand the importance of the security of data (personal and financial) and the main methods of protecting data from unauthorised access (both internally.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Computer Security Sample security policy Dr Alexei Vernitski.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Information Systems Design and Development Security Precautions Computing Science.
Computer Security Keeping you and your computer safe in the digital world.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Section 4 Policies and legislation AQA ICT A2 Level © Nelson Thornes Section 4: Policies and Legislation Legislation – practical implications.
1. Get out homework 2. Open the “Data Security” document from the shared area and save it in to your area. Business Studies/Year 11/AQA Revision/6 Data.
Technical Implementation: Security Risks
8 – Protecting Data and Security
How it affects policies and procedures
Communicating in the IT Industry
G061 - Network Security.
Presentation transcript:

Primary/secondary data sources Health and safety Security of Data Data Protection Act

1.5 ICT Data Systems in Business  be aware that there are a wide range of primary and secondary sources of data

 Primary data is collected first hand by a business (e.g. through questionnaires and surveys)  Secondary data is information that’s been collected by someone outside the business (e.g. market research reports, government publications, articles in newspapers or on the internet)  Primary research is expensive and time-consuming ◦ But it is directly relevant to the business  Secondary research is cheap and instantly available ◦ But it may not be up to date or completely relevant

1.4 Health and Safety  be aware of the responsibilities of employers to provide a safe working environment and for employees to act in a safe manner  be aware of how health and safety regulations affect ICT users, (e.g. the Display Screen Regulations) and their implications on workstations and office layout

 BBC bitesize  Click on GCSE  Click on ICT  Scroll down to “Risks and implications of ICT”  Click on “Health and safety when working with computers”  Read the information; do the test

 List three health problems that may affect employees who use computers for long periods of time ◦ Eye strain ◦ RSI ◦ Backache and neck pain ◦ DVT ◦ Stress

 Name 3 things that employees should do to reduce health and safety risks at work ◦ act responsibly and take care of their and other people’s safety ◦ take reasonable precautions to reduce risks ◦ use breaks to walk around and exercise fingers and hands ◦ carry out tasks as they have been trained to ◦ report dangerous practice

 Open these slides from the shared area Business Studies/year 11/8 Theory/Revision/session 3

1.6 Data Security  understand the importance of the security of data (personal and financial) and the main methods of protecting data from unauthorised access (both internally and externally) including virus protection software, firewalls, passwords, encryption of documents and screen-savers.  be aware that the Data Protection Act places legal restrictions on the collection, storage and communication of personal data.

 Stolen data can be used to commit identity theft or steal money from bank accounts and credit cards  Some data could reduce a companies competitiveness if leaked to competitors  Data that is corrupted or altered by unauthorised users is useless to a business

 Physical security (locks and alarm systems)  Access security (user names and passwords, firewalls, screen-savers, encryption software)  Defensive security (anti-virus software, anti- spam software, anti-adware software, anti- spyware software)

 Open the word document from the shared area Business Studies/year 11/unit 8 theory/5 data security/security measures  Explain how each of the security measures keeps data more secure

 Anti-virus software is a program that is designed to prevent, search for, detect, and remove software viruses, and other malicious software like worms, trojans and adware.  As files are downloaded anti-virus software will scan the file to make sure that it doesn’t contain a virus. The software will also scan your whole computer regularly to check that no viruses have been introduced.  If a virus is found the file containing it will either be quarantined or deleted.

 A firewall is software (or hardware) that checks information coming from the Internet or a network, and then either blocks it or allows it to pass through to your computer, depending on your firewall settings.  A firewall can help prevent hackers or malicious software (such as worms) from gaining access to your computer through a network or the Internet. A firewall can also help stop your computer from sending malicious software to other computers.

 Passwords can be set on user accounts and on individual files. Without a password a user cannot log on to the system. Without a file password a user cannot open the file.

 Encryption “scrambles” data so that it cannot be read unless the computer/person trying to read it has the key. Encryption cannot prevent a message being intercepted, but it can prevent anyone being able to read the message unless they have the key.

 A screen saver pops up after a certain length of inactivity and so the data on screen cannot be read. In some cases when the screen saver comes on, the screen also “locks” so that the user has to re-enter their password in order to continue using the computer.

 As well as software security physical security should be used to keep data secure. For example, the data server room could be locked so that only authorised users can enter the room.

 The Data Protection Act (1998).  It states that: ◦ any business or organisation that holds personal data about individuals (data subjects) must comply with the 8 data protection principles ◦ data subjects have various rights to see, correct and prevent their personal data being processed or used for marketing without their permission

 Go to   Choose ICT/Key Stage 4/GCSE ICT  Click on “New Resources”  Scroll down to “Legal Issues”  Click on “Data Protection Act”  Click on “Quizzes”