BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Security Strategy. You will need to be able to explain:  Data Security  Data Integrity and  Data Privacy  Risks  Hacking  Denial of Service DOS.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Lesson 13 PROTECTING AND SHARING DOCUMENTS
SECURITY What does this word mean to you? The sum of all measures taken to prevent loss of any kind.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Security Awareness: Applying Practical Security in Your World
Factors to be taken into account when designing ICT Security Policies
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
The laws Organizations are covered by lots of different laws
Administrative Practices Outcome 1
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
General Purpose Packages
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Introduction to Information and Computer Science Security Lecture b This material (Comp4_Unit8b) was developed by Oregon Health and Science University,
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Security Chapter 8 Objectives Societal impact of information and information technology –Explain the meaning of terms related to computer security and.
Component 4: Introduction to Information and Computer Science Unit 8: Security Lecture 2 This material was developed by Oregon Health & Science University,
1.1 System Performance Security Module 1 Version 5.
Security and backups GCSE ICT.
Security Issues, Ethics, & Emerging Technologies in Education
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
Starter How many methods of keeping data secure can you think of… Username and Password Biometrics Digital Signature Encryption Access Levels Physical.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Every computer along the path of your data can see what you send and receive. USERNAMES and PASSWORDS  Username can be assigned to you eg. Student ID.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Data Security.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Communication in Administration (Security)
Welcome Topic : Security.
Access Control / Authenticity Michael Sheppard 11/10/10.
Topic 8 – Security Methods 1)TechMed scenario covers Security methods and devices, including biometrics In the scenario: Implied.
Networks. Learning Objectives: By the end of this lesson you should be able to:
Objectives  Legislation:  Understand that implementation of legislation will impact on procedures within an organisation.  Describe.
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Computer Security Sample security policy Dr Alexei Vernitski.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Information Systems Design and Development Security Precautions Computing Science.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
Technical Implementation: Security Risks
8 – Protecting Data and Security
ISMS Information Security Management System
Data security OCR Cambridge Nationals in ICT Level 1/2 © Hodder & Stoughton 2013.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Security of People, Property and Information
Data Security GCSE ICT.
Part 3.
Security of Data  
Unit 4 IT Security Kerris Davies.
G061 - Network Security.
Presentation transcript:

BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection

Network Security Network security ensures that unauthorised users are prevented from accessing, misusing or editing a computer network The network administrator controls who can access the files on a network by setting up different types of network security Network security is essential to safeguard a business, customer and staff information

Network Security Usernames and Passwords Password policy Access rights and permissions

Usernames and passwords A username/user ID must be used by a member of staff in a business if they want to log on to a computer or network It will identify the user to the system so their profile or settings are loaded For security purposes, a password is required also. It ensures that the person logging in is who they say they are Cable Ties Ltd will assign usernames but staff choose their own passwords

Password Policy Passwords should:  Be kept private and told to no-one  Be changed regularly  Not written down  Be made up of at least 6 characters  Use upper and lower case letters and numbers  Be easy to remember but not too easy to guess

Access rights and permissions Allows the user to control who can read, edit, alter or save files or folders Cable Ties Ltd can control which files employees such as office staff, technicians or managers can look at Managers may have more permissions than office staff or technicians etc.

Physical Security This ensures that all of the hardware of the network is protected from theft and kept safe There are a number of ways the business can protect against this but it is also down to employees to be aware of the steps they should take to keep their equipment safe

Physical Security Serial Number everything Alarms on Doors locked Fire protection Lock windows/doors Avoid ground floor Blinds closed

Data Security This means that there are measures taken to prevent the loss of data held on the system Your data is much more valuable than your computer equipment –it is priceless so must be kept secure at all times You can protect your equipment with insurance, but this will not replace your data

Data Security Password protect Restrict access Backups Read only files Encryption Virus checks Firewalls Biometric methods (fingerprinting, retina scanning, face recognition)

Password Protection Used on files and folders to ensure only those with permission can access sensitive information such as customer details, sales figures etc. Passwords can be used on documents to restrict opening, editing, saving or copying

Restrict access When restricting access to a document you have a number of options: Encrypt with password – Requires a password to open the document Restrict editing – Controls the changes that people can make to the document Restrict permission by people – Grants people access to documents but removes ability to edit, copy or print Add a digital signature – Adds an invisible digital signature to ensure the integrity of the document

Encryption This is where you hide the contents of a file so they cannot be easily read if stolen or illegally accessed Data can be scrambled using data encryption software when it is stored or transmitted It uses an encryption code or key to scramble (encrypt) the contents of data files The proper code is needed to unscramble the file (decrypt it) so it can be read or used

Using an encryption key Be ready at 7.30 TG&Q.>/ Be ready at 7.30 Encryption key used to scramble message Scrambled message sent The encrypted message Same encryption key used to unscramble message Message written Message can be read

Virus checks & firewalls Virus checkers can be used to check information is not corrupted You can preform virus checkers on a regular basis and a lot of computer systems will do this automatically so data is kept safe Firewalls are used to prevent hackers from accessing the data from the Internet They can be turned on and in most businesses the network administrator will have done this for you