Unit 13 IT Systems Troubleshooting and Repair Anne Sewell

Slides:



Advertisements
Similar presentations
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Advertisements

A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Data Security for Healthcare Facilities Debbie Abbott Health Information Consultant Resolutions (Int) Pty Ltd.
Factors to be taken into account when designing ICT Security Policies
 Lesson 05: Computer Maintenance. Keep Software Up-To-Date Patches Security Holes Improves Software Stability Improves Software Performance Adds.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
Protecting ICT Systems
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
IT Security for Users By Matthew Moody.
XP New Perspectives on Microsoft Office Access 2003 Tutorial 12 1 Microsoft Office Access 2003 Tutorial 12 – Managing and Securing a Database.
1.1 System Performance Security Module 1 Version 5.
Security and backups GCSE ICT.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
1. Chapter 25 Protecting and Preparing Documents.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Phishing scams Phishing is the fraudulent practice of sending s purporting to be from reputable companies in order to induce individuals to reveal.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Module 15 Managing Windows Server® 2008 Backup and Restore.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Kamran Didcote.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
By Liam Wright Manga comic group Japan SAFETY on your computer.
IT1001 – Personal Computer Hardware & system Operations Week7- Introduction to backup & restore tools Introduction to user account with access rights.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Unit 12 – IT Technical Support – Anne Sewell Aims of the lesson: To carry out a back-up of files to a USB or desktop. This is a build-up exercise towards.
Computer Security Sample security policy Dr Alexei Vernitski.
Scientific data storage: How are computers involved in the following?
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Networking Objectives Understand what the following policies will contain – Disaster recovery – Backup – Archiving – Acceptable use – failover.
Security Risks Todays Lesson Security Risks Security Precautions
PUBLIC COMPUTER SAFETY
Chapter 6 Protecting Your Files
Security Issues in Information Technology
Chapter Objectives In this chapter, you will learn:
3.6 Fundamentals of cyber security
Unit 4 IT Security.
Handling Personal Data
Administrative Practices Outcome 1
Practical Office 2007 Chapter 10
Ways to protect yourself against hackers
How to use the internet safely and How to protect my personal data?
Systems Software Keywords Utilities and Backups
Lecture 14: Business Information Systems - ICT Security
Information Security 101 Richard Davis, Rob Laltrello.
Business Risks of Insecure Networks
Chapter 6 Purchasing and Maintaining a Computer
Microsoft Office Access 2003
Security of Data  
Unit 4 IT Security Kerris Davies.
Communicating in the IT Industry
G061 - Network Security.
Presentation transcript:

Unit 13 IT Systems Troubleshooting and Repair Anne Sewell Lesson Objective “To Understand data security and Integrity” Looking at Assignment 2, Working Towards M3: “Maintain data security and integrity when applying fault remedies” Activities in this lesson will be based around data security and backing up data

Mini Activity Working in pairs, write down 3 things you think you know about Data Security: ___________________________________________ Names: ___________________ ___________________

Assignment 2: Diagnostics and repairs Task 8 M3 maintain data security and integrity when applying fault remedies. Finally, the IT Manager has decided to offer you the promotion on the condition that you can prove that you are capable of maintaining data security and integrity when applying fault remedies. You need to evidence this task using annotated ‘before’ and ‘after’ screen dumps of backing up data and restoration. In addition, you need to provide an explanation in MSWord of what other procedures should be in place to maintain data security and integrity. Data security and integrity: data back-up; recovery procedures; maintaining security e.g. virus protection, access rights, physical protection

What does “Data security” mean?

What does “Data security” mean? Physical security, network security and security of computer systems

What does “integrity” mean?

What does “integrity” mean? “the state of being whole and undivided”

Data Security You may have written down something similar to the following Data security is about keeping data safe. Many individuals, small businesses and major companies rely heavily on their computer systems. If the data on these computer systems is damaged, lost, or stolen, it can lead to disaster.

Data Security The Key Threats to Data Security Data may get: lost or damaged during a system crash - especially one affecting the hard disk corrupted as a result of faulty disks, disk drives, or power failures lost by accidentally deleting or overwriting files lost or become corrupted by computer viruses hacked into by unauthorized users and deleted or altered destroyed by natural disasters, acts of terrorism, or war deleted or altered by employees wishing to make money or take revenge on their employer!

Keeping Data Secure Measures that can be taken to keep data secure include: making regular backups of files (backup copies should be stored in fireproof safes or in another building) Protecting against viruses by running anti-virus software using a system of passwords so that access to data is restricted safe storage of important files stored on removable disks, e.g. locked away in a fireproof and waterproof safe allowing only authorized staff into certain computer areas, for example by controlling entry to these areas by means of ID cards or magnetic swipe cards

Keeping Data Secure always logging off or turning terminals off and if possible locking them avoiding accidental deletion of files by write-protecting disks Minimise the possibility of loosing files by emailing them to yourself or using Cloud technology to save “offsite” (away from your office) using data encryption techniques to code data so that it makes no apparent sense

Keeping Data Secure Online Banking When banking online, after logging in, always check that the ‘http’ in the address bar has changed to ‘https’. This indicates that a secure connection between your computer and the bank's computer has been established. Data sent between the two computers is encrypted so that anyone trying to intercept your data will receive meaningless data. The data can only be decrypted into readable data by using a key that is known only to the two computers - yours and the bank's.

Activity Data Security Question In a local doctor's surgery, data about the patients is stored in a database on a computer. Consider two physical precautions that should be taken to keep the data secure.

Activity Data Security Possible Answers keep the computer area secure keep backups in a safe place Hint The key word is physical - the question is asking for the physical precautions you can take to protect data. Keeping the computer area secure and keeping backups in a safe place are both physical precautions. Swipe card entry, locking terminals or controlling access to computer areas would also have been good answers.

Activity Data Security Question The doctor needs to see all the information about patients. The receptionist only needs to see some of the information. Describe one way in which software could restrict access to patient information.

Activity Data Security Answer Make it so users must enter a password to gain access to certain areas of the database. Comment The question is looking for detail about different types of access for different users. This answer clearly highlights the need for having passwords for different levels of access.

How to Back Up Your Files/Computer in Windows http://www.youtube.com/watch?v=x_jih9HukwI

Wordle says…

Activity 1 Quiz Complete the 9 questions on the Interactive questionnaire under unit 13 on Moodle (the questions relate to the information on the slides we have just looked at) Add your name to the printout and hand in as evidence towards M3

Activity: copy information from one place to another for safekeeping - handout Working in small groups – use the laptops provided to backup data. Use the USB provided to do this. START/SETTINGS/CONTROL PANEL From ‘Pick a Category’ choose: ‘Performance and Maintenance’ From ‘Pick a Task’ choose: ‘Back up your data’ From ‘Backup or Restore Wizard’ choose: ‘Backup Files and Settings’. CLICK ON ‘Next’ In the ‘What to Back up’ choose: ‘My Documents and settings’, CLICK ON ‘Next’ Choose a ‘Place to save your backup’ (USB) Type a name i.e. annesbackup, click NEXT In the ‘Completing the Backup or Restore Wizard’ choose ‘FINISH’. ‘Backup Progress’ shows then ‘FINISH’. ‘The Backup is Complete’.

Activity Differentiation Click on the following link and watch the interactive video on data security (use subtitles) – you will need to respond to questions when asked http://www.bbc.co.uk/schools/gcsebitesize/ict/databas es/6datasecurityrev1.shtml

Online Activity Differentiation Locate this PowerPoint document on the VLE from Unit 13 Click on the link and carry out the following: http://www.bbc.co.uk/schools/gcsebit esize/ict/implications/virusesandlifestyle s_act.shtml

References http://www.bbc.co.uk/apps/ifl/schools/gcsebitesize/ic t/quizengine?quiz=datasecurity;templateStyle=ict Edexcel Unit 13 chapter Intranet resources for Unit 13

Homework Deadline Monday 20th April Complete M3 Assignment Task on Assignment 2. Deadline Monday 20th April