INFORMATION TECHNOLOGY

Slides:



Advertisements
Similar presentations
Computer Crimes A criminal act committed through the use of a computer. It can also involve the theft of a computer and any equipment associated with the.
Advertisements

GCSE ICT Networks & Security..
Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Commercial Data Processing Computer Crime. Computer crime can be very hard to prevent. Typical crimes involve destroying, corrupting or changing the data.
Security Strategy. You will need to be able to explain:  Data Security  Data Integrity and  Data Privacy  Risks  Hacking  Denial of Service DOS.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Hacking. Learning Objectives: At the end of this lesson you should be able to:
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Format Scandisk Defragmentation Antivirus Compression Software
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
Chapter 19 Security Transparencies. 2 Chapter 19 - Objectives Scope of database security. Why database security is a serious concern for an organization.
Computer Misuse Act (1990). What is Computer Misuse Act (1990)? The Computer Misuse Act of 1990 is a law in the UK that makes illegal certain activities,
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
WHAT Exam Practice WHY All MUST Most SHOULD Some COULD Be able to understand the requirements of the exam to achieve a grade D Be able to understand the.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
General Purpose Packages
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
Section 6 Theory Software Copyright, Viruses and Hacking.
Security and backups GCSE ICT.
IT security By Tilly Gerlack.
Ways to organize electronic files Witness fitness By: Simran and Navneet.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
Viruses, Computer Security & Ethical Issues Digital Communication Systems Ms. Powers.
Checking data GCSE ICT.
Checking data Chapter 7 Prepared by:Sir Mazhar Javed.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Rebecca Pritchard.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
System Development Lifecycle Verification and Validation.
1.The Nature, Impact and Issues of Information Technology 1.6Strategies used to Prevent Deliberate and Accidental Illegal Actions.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
Jan 11 Encryption and Hacking. Your Answer Data encryption is used to keep information safe from unauthorised users. Data encryption software makes the.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
DATA ERRORS. Introduction The processing of incorrect data can produce ridiculous and embarrassing output. Errors can take time to sort out and can be.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Verification & Validation F451 AS Computing. Why check data? It’s useless if inaccurate. Also, wrong data: Can be annoying Can cost a fortune Can be dangerous.
Computer security By Isabelle Cooper.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Verification & Validation. Batch processing In a batch processing system, documents such as sales orders are collected into batches of typically 50 documents.
Review of Data Capture. Input Devices What input devices are suitable for data entry? Keyboard Voice Bar Code MICR OMR Smart Cards / Magnetic Stripe cards.
1 3 Computing System Fundamentals 3.6 Errors Prevention and Recovery.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Verification & Validation
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Cryptographic Hash Function. A hash function H accepts a variable-length block of data as input and produces a fixed-size hash value h = H(M). The principal.
Data Capture Forms What are they?. Example 1 Example 2.
Unit 13 IT Systems Troubleshooting and Repair Anne Sewell
Controlling Computer-Based Information Systems, Part II
Encryption and Hacking
Security of Data  
Computer Misuse Act 1990 GCSE ICT.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
Presentation transcript:

INFORMATION TECHNOLOGY Security and Integrity of Data

The Security and Integrity of Data The security of data means the protection of data. Security involves protecting data and software from being: Lost losing disks, badly named Destroyed fire or flood, deletion Corrupted scratches on disk Modified written over, updated by mistake Disclosed unauthorised access

Possible threats to data security Hacking means obtaining access to a computer system without authority. It is now illegal. There are 3 main offences: Gaining unauthorised access Altering programs and data Gaining access to commit fraud A computer virus is a program which copies itself without the user intending it to. They usually affect .exe files, can delete files on a hard disk. Macro viruses affect data in programs such as Word

Ways to protect data A backup file is a copy of a file which is kept in case anything happens to the original file. Can be kept on a floppy or a different hard disk Can be kept on a backup data tape Archive files are kept in long term storage in case they are required. Often from a back up data tape Back-up systems often use: Grandfather – Father – Son principal

Physical safeguards for data protection Physical safeguards for data include: Locking files in a fireproof safe To protect files being overwritten use the write protect tab on disks & tapes Keeping unauthorised people from entering secure areas by using locks and security passes etc.

Other safeguards Software safeguards include giving users: A user identity and a password. Users of this type of system have to log in and log out every time they use it. Other safeguards include: Password individual files. Data encryption. To encrypt data is to encode it so that it is unreadable by anyone else who does not have the ‘key’.

Data integrity The integrity of data means its accuracy and completeness. Data has integrity if it has not been corrupted in any way. Common causes of errors are: Mistakes in data capture (faulty sensors etc) Transmission errors (over the internet etc) Transcription errors (transposition of lettres) Data is said to be corrupt if errors are introduced into it. Usually the errors have been introduced by faulty equipment.

Ways of checking data integrity (1) A check digit is an extra digit added to a number so that, if a number is changed, the error will be detected. Method Starting from the right, multiply the first digit by 1, the second by 2 etc Add the results together Use the last digit of the result and add to end of number. Example: 56037 becomes 560372 Example: 50637 becomes 506376

Ways of checking data integrity (2) Verification is checking data which has been copied from one place to another to see if that it is still the same. Verification of keyed data may involve re-keying it. Double-entry verification involves 2 people keying in the same data and then comparing the data for anomalies.

Ways of checking data integrity (3) Validation is checking data before processing to see that it is acceptable for the process and include: Type checks (e.g. numeric or alphanumeric) Length checks (right number of characters) Range checks (days between 1-31; months 1-12) Both Databases and spreadsheet programs have methods of validating data input so that obviously incorrect data is not accepted by the software which then warns the user.

EXAM QUESTIONS Describe how a computer hacker might do more harm than an office burglar. Give two ways of protecting personal data. Why is is a good idea to have at least 6 characters in a password.

EXAM QUESTIONS Dates are read into a computer in the following format: DDMMMYY e.g. 15DEC92 Each of the following dates has been rejected by a validation program. State which validation check has been used to discover each error. AUG2166 3JAN71 31SEP72 Produce a comprehensive list of test data to test the data on this program.