By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

Slides:



Advertisements
Similar presentations
How to protect yourself, your computer, and others on the internet
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
Shelby County Technology Scope and Sequence 6-8 #8: AUP Computer Fraud Copyright Violations Penalties Nancy Law Columbiana Middle School.
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Legislation in ICT.
Security, Privacy, and Ethics Online Computer Crimes.
Computer Security & Safety
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
Chapter 9 Information Systems Ethics, Computer Crime, and Security
Privacy & Security By Martin Perez. Introduction  Information system - People : meaning use, the people who use computers. - Procedures : Guidelines.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
Legislation in ICT. Data Protection Act (1998) What is the Data Protection Act (1998) and why was it created? What are the eight principles of the Data.
The Legal Framework Can you work out which slide each bullet point should go on?!
Issues Raised by ICT.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Course: Introduction to Computers Lecture: 6.  Commercial software is covered by Copyrights.  You have to pay for it and register to have the license.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
General Purpose Packages
Staying Safe. Files can be added to a computer by:- when users are copying files from a USB stick or CD/DVD - downloading files from the Internet - opening.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
The Internet = A World of Opportunities Look what’s at your fingertips A way to communicate with friends, family, colleagues Access to information and.
Your Interactive Guide to the Digital World Discovering Computers 2012.
1.1 System Performance Security Module 1 Version 5.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Section 6 Theory Software Copyright, Viruses and Hacking.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
  A virus is illegal computer code that can alter programs or destroy data.  A virus can copy itself onto programs, spreading its damaging effects.
Chapter 5: General Computer Topics Department of Computer Science Foundation Year Program Umm Alqura University, Makkah Computer Skills /1436.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
1 Computer Crime Often defies detection Amount stolen or diverted can be substantial Crime is “clean” and nonviolent Number of IT-related security incidents.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
ICT Homework- ICT Security Consultant PowerPoint.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Internet Safety Internet Safety LPM
Social Issues. Employment change Computer Ethics Privacy Piracy Computer Crime Computer Viruses Data Protection and security.
Chap1: Is there a Security Problem in Computing?.
COMPUTER VIRUSES Class: Year 8 ‘A’ Date : 2 nd February 2009.
Computer Security Presented By : Ebtihal Mohammed AL-Amro.
CONTROLLING INFORMATION SYSTEMS
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Security and Ethics Safeguards and Codes of Conduct.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
WHAT IS CYBER SECURITY? Governments, military, corporations, financial institutions, hospitals and other businesses collect, process and store a great.
1 Computer Security and Privacy. 2 Terms Computer security risk Computer crime Cybercrime Hacker Cracker Script kiddie Corporate spy Unethical employee.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Security Issues in Information Technology
Legislation in ICT.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
A Trojan is a computer program that contains the malicious code and it misleads users and user's computer. It aims to designed to perform something is.
Computer Ethics.
Data integrity and security
Part 3.
Unit 4 IT Security Kerris Davies.
Legislation in ICT.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

By Mrs. Smith DATA INTEGRITY AND SECURITY

Accurate Complete Valid Data Integrity

 Data integrity refers to the validity of data.  Making sure data stored is accurate.  Ensuring data stored is not intentionally altered. Data Integrity

Inaccurate data entry Viruses Hardware malfunctions Accidental or Malicious deletion or changing of data Natural Disasters How can data integrity be compromised?

 Data security is ensuring your data is not compromised.  Data security can be classified into two main groups:  Physical safeguards  Software safeguards Data Security

Hire Security Guards

Installing locks on doors

Software Safeguards

#1 Using Passwords to access the Computer System

#2 Using passwords for individual files or folders.

#3 Data Encryption – Coding/ Scrambling your data the encoded version of a message

 A malicious program that activates itself unknown to the user and destroys or corrupts data.

 Downloading infected programs and files from t he internet  Opening infected files received through s  Using storage devices that contain infected files

 A business can lose millions of dollars due to:  data corruption,  Lost data and  computer down time

 Install antivirus software and always keep it up to date with the latest virus definitions  Do not use storage devices from other computers in your computer unless you scan for viruses first  Do not open attachments that contain.exe,.com or.vbs file extensions

 The right of individuals to determine what information is being kept about them and how the information will be used.  Data privacy act 1984 – requires that all data being kept about an individual be accurate and used only for the purpose for which it was collected

It requires that all data being kept about an individual be accurate and used only for the purpose for which it was collected Data Privacy Act 1984 USA

Ensures that any organization, company or governmental organization storing information on individuals abides by the following rules:  Data must not be used for any purpose other than what it was collected for  Data must be updated to maintain integrity  Data must be protected from unauthorized access and use  Individuals have the right to check data held about them Data Protection Act 1998 UK

This act ensures:  Transparency  Accountability  Equality of Access  Empowerment and Increased Participation Freedom of Information Act 1999 TT

Software piracy Hacking Internet Fraud COMPUTER CRIMES

 The unauthorized copying, use or selling of software that is copyrighted Software Piracy

 The unauthorized accessing of a computer system:  To steal confidential data  To copy computer programs illegally  To alter data  To destroy data (deleting or implanting virus)  To transfer money using Electronic Funds Transfer (EFT) Hacking

 Mainly the bogus selling of products over the internet