Air Traffic Control. 1.1 Reliability It is extremely important that the air traffic control systems are reliable and do not end up crashing. If the air.

Slides:



Advertisements
Similar presentations
P1-P2-M1-D1-D2.
Advertisements

Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Crime and Security in the Networked Economy Part 4.
Security+ Guide to Network Security Fundamentals
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Securing Your Networks Personal Safety Rules Apply Here Too. Corporate Identity Theft SPAM.
9 99 CHAPTER Privacy and Security - FAQ’s. 9 © The McGraw-Hill Companies, Inc Privacy How secure is data –On system –On Internet Private network.
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
E-commerce security by Asif Dalwai Introduction E-commerce applications Threats in e-commerce applications Measures to handle threats Incorporate.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Unit 28- Website Development Assignment 1- THEORY P3
Factors to be taken into account when designing ICT Security Policies
Security Overview. 2 Objectives Understand network security Understand security threat trends and their ramifications Understand the goals of network.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
11.1 Copyright © 2005 Pearson Education Canada Inc. Management Information Systems, Second Canadian Edition Chapter 11: Information Systems Security, Quality,
Safety By Design Flight Certification AE 6362 Airbus Derivative Team Project Dr. Daniel P. Schrage Course Instructor.
1 Chapter 8 Securing Information Systems. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Protecting ICT Systems
Pre-Computer Skills Internet 1. General Concepts Internet A system of connected computers that allows your computer to exchange data, messages and files.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
IT Security for Users By Matthew Moody.
Section 9 External and internal resources AQA ICT A2 Level © Nelson Thornes Section 9: External and internal resources Management of Internal Resources.
1-1 Managing Information Technology. 1-2 Information ●What information do businesses keep and use? ●What information have you been exposed to today?
Section 6 Theory Software Copyright, Viruses and Hacking.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
Security and backups GCSE ICT.
C8- Securing Information Systems
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
MMTK Access control. Session overview Introduction to access control Passwords –Computers –Files –Online spaces and networks Firewalls.
IP Security IP sec IPsec is short for Internet Protocol Security. It was originally created as a part of IPv6, but has been retrofitted into IPv4. It.
 Jaden Terry.  To obtain privacy and protect data from other people. o Businesses Customer/Employee information Credit card numbers To gain a competitive.
1 Chpt. 12: INFORMATION SYSTEM QUALITY, SECURITY, AND CONTROL.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
McLean HIGHER COMPUTER NETWORKING Lesson 14 Firewalls & Filtering Comparison of Internet content filtering methods: firewalls, Internet filtering.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Intro to Firewalls. A firewall is hardware, software, or a combination of both that is used to prevent unauthorized programs or Internet users from accessing.
Data Security.
Health & Safety P4 & P5. H & S – P4  Responsibilities of supervisors and employees when complying with health and safety regulations and legislation.
Unit 22 People in Computing
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
By Liam Wright Manga comic group Japan SAFETY on your computer.
© 2009 The McGraw-Hill Companies, Inc. All rights reserved. 5 McGraw-Hill There are several ways to examine how management works –Divide the tasks that.
CONTROLLING INFORMATION SYSTEMS
1 AQA ICT AS Level © Nelson Thornes Firewalls and Virus Checkers.
BTEC NAT Unit 15 - Organisational Systems Security ORGANISATIONAL SYSTEMS SECURITY Unit 15 Lecture 3 OTHER DAMAGING THREATS.
Security risks in a network. Remote access  When you connect a computer to a network it is visible to all other computers on the network. When you connect.
Strand 1: Social and ethical significance SL/HL core Social and ethical considerations linked to specified IT developments. Students must study the following.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Topic: Reliability and Integrity. Reliability refers to the operation of hardware, the design of software, the accuracy of data or the correspondence.
BASIC SECURITY THREATS TO INFORMATION SYSTEMS. All information systems linked up in networks are prone to security violations. All information systems.
Mr. Lagomarsino Money Power with Technology Applications.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
8 – Protecting Data and Security
Securing Information Systems
Security Of Information Systems
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Managing Information Technology
Data integrity and security
INFORMATION SYSTEMS SECURITY and CONTROL
Networks By the end of this session, you will:
Computer System Security
Presentation transcript:

Air Traffic Control

1.1 Reliability It is extremely important that the air traffic control systems are reliable and do not end up crashing. If the air traffic controllers systems do fail the pilots in the air will have no guidance and support as the come in to land this will mostly certainly cause an aviation accident (e.g. a plane crash).

1.2 Security Security of the airports air traffic control systems is vital and should be of the upmost importance. Failure of the air traffic control systems may lead to alteration of the data or system failure this may ultimately lead to a major disaster. Some forms of security the airport control systems must use to prevent viruses and hackers from gaining access, include; setting up a firewall, using data encryption and up-to-date antivirus software.

2.2 Education and training Education and training for the job of air traffic controller as it requires a lot of skill in order to do the job effectively as there is no room for error during the job as lives hang in the balance. One way airports and airline companies can ensure they have skilled employees is by providing scholarships as well as

3.1 Hardware

3.2 Software

3.3 Networks

3.4 Internet

3.5