A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
By: Jack, Anna, Cassidy and Patrick October 7, 2008.
POSSIBLE THREATS TO DATA
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
INFORMATION TECHNOLOGY
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Keeping Data Safe Revision Summer How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.
Threats to I.T Internet security By Cameron Mundy.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Security. Introduction to Security Why do we need security? What happens if data is lost? –Wrong business decisions through lack of information –Long-term.
Protecting ICT Systems
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
1.1 System Performance Security Module 1 Version 5.
Section 6 Theory Software Copyright, Viruses and Hacking.
Security and backups GCSE ICT.
XP Chapter 2 Succeeding in Business with Microsoft Office Access 2003: A Problem-Solving Approach 1 Building The Database Chapter 2 “It is only the farmer.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Chap1: Is there a Security Problem in Computing?.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
C OMPUTER THREATS, ATTACKS AND ASSETS DONE BY NISHANT NARVEKAR TE COMP
Computer Laws Data Protection Act 1998 Computer Misuse Act 1990.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Unit 12 – IT Technical Support – Anne Sewell Aims of the lesson: To carry out a back-up of files to a USB or desktop. This is a build-up exercise towards.
Information Systems Design and Development Security Precautions Computing Science.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
8 – Protecting Data and Security
Chapter 40 Internet Security.
Unit 13 IT Systems Troubleshooting and Repair Anne Sewell
AS ICT Module 2 Objectives: Security of Data
UNIT 19 Data Security 2.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Data Security GCSE ICT.
Security of Data  
Faculty of Science IT Department By Raz Dara MA.
Unit 4 IT Security Kerris Davies.
What is Information Security?
Communicating in the IT Industry
G061 - Network Security.
Presentation transcript:

A-Level Computing data damage and prevention

Objectives To know the dangers associated with a computer system To understand the methods of prevention To be able to demonstrate the need for prevention methods

Privacy & Security What can cause damage to a computer system?

Privacy & Security Accidental & Malicious Damage Hardware failure - all hardware dies eventually. Software Failure - programming bugs Human Errors - hanging of data or deletion of files Malicious Damage - angry employee, a virus or a hacker.

Privacy & Security Any loss or corruption of data will have serious or fatal implications for the performance of the application Delays, loss of business and possible legal action may result.

Privacy & Security What can you do to prevent damage to your computer system

Privacy & Security Physical security Security Guards Alarms Locks Swipe/ID Cards Read/Write Tabs

Privacy & Security In order to gain access to the system a user is supplied with a user name together with a personal password. Operating system will check the user name and password are valid before allowing the user to log in. Some files may be open by anyone, others only by those users with a particular level of access.

Privacy & Security The file itself has attributes that can be set. The commonly used ones in Windows are: Read-only - the file can be read but not altered Hidden - the file is not displayed in listings of files.

Privacy & Security Computers connected to networks - especially the Internet - need to be protected from hackers. Firewalls are software methods of blocking access to anyone from outside a network unless they are authorised.

Privacy & Security To maintain file security when data is transferred from one computer to another the data can be encrypted. This means that the data is encoded in some way before it is sent, and therefore meaningless to anyone intercepting the message. The data is then decoded at the receiving end by the user who knows the way to decrypt it (often referred to as the key).

Privacy & Security Key - next letter along in alphabet: IFMMP XPSME HELLO WORLD Data encryption can also be used when data is stored on a file. A hacker accessing the data will find it meaningless unless he has the key.

Privacy & Security Important files of data should be regularly backed up - this means making another copy of the data and storing the copy in a different place. Many organisations run a daily backup - scheduled to run overnight, but backups can be done any time. Backups may be stored on the same computer - but it is better to store them on a different one.

Privacy & Security Backups of data may also be stored on backing storage media such as CD, DVD or tape cartridge. The backup copies should be stored securely - a locked room or a fire-proof safe. As broadband Internet access becomes more widespread, backups to remote sites are becoming more popular.

Privacy & Security If data is accidentally or deliberately lost or damaged, the backup data should be loaded. All changes to the data since the backup was made will need to be done again.