Data Security GCSE ICT.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

Backing up and Archiving Data Chapter 1. Introduction This presentation covers the following: – What is backing up – What is archiving – Why are both.
POSSIBLE THREATS TO DATA
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Viruses,Hacking and Backups By Grace Mackay 8K Viruses Hacking and Hackers Backups.
Security, Privacy, and Ethics Online Computer Crimes.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
The laws Organizations are covered by lots of different laws
Threats to I.T Internet security By Cameron Mundy.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
E-business Security Dana Vasiloaica Institute of Technology Sligo 22 April 2006.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Video Following is a video of what can happen if you don’t update your security settings! security.
Security. Introduction to Security Why do we need security? What happens if data is lost? –Wrong business decisions through lack of information –Long-term.
Protecting ICT Systems
Disaster Planning and Security Policies. Threats to data DeliberateTerrorism Criminal vandalism/sabotage White collar crime Accidental Floods and fire,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Data Confidentiality. Learning Objectives: By the end of this topic you should be able to: discuss the need to keep data confidential explain how data.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
IT Security for Users By Matthew Moody.
1.1 System Performance Security Module 1 Version 5.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Section 6 Theory Software Copyright, Viruses and Hacking.
Security and backups GCSE ICT.
IT security By Tilly Gerlack.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
1 Maintain System Integrity Maintain Equipment and Consumables ICAS2017B_ICAU2007B Using Computer Operating system ICAU2231B Caring for Technology Backup.
Pass ECDL41 European Computer Driving Licence Module 1 – Concepts of IT Chapter 1.6 – Legal Issues and Security.
Year 9 Autumn Assessment Computer system/Information security-Planning, Communicating, Information. By Louis Smith-Lassey 9k 9Y1.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Viruses Hacking Backups Computer safety... Viruses A computer virus is a piece of program code that makes copies of itself by attaching itself to another.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Data Security.
All about viruses, hacking and backups By Harriet Thomas.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Policies and Security for Internet Access
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
Computer Security Sample security policy Dr Alexei Vernitski.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
Information Systems Design and Development Security Precautions Computing Science.
Computer Security Keeping you and your computer safe in the digital world.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
8 – Protecting Data and Security
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Data Security GCSE ICT.
G061 - Network Security.
European Computer Driving Licence Syllabus version 5.0
Presentation transcript:

Data Security GCSE ICT

Network Security Physical security means that the hardware of the network is protected from theft and kept safe. Access security means that there is a limit to the amount of access a user has to the information held on the network. Data security means that there are measures taken to prevent the loss of data held on the system.

Data Security Confidential information must be kept securely Only authorised personnel should have access to confidential information Pass ECDL4

Backing Up Data You should always back up your data on a regular basis Keep a second copy of important files on a external hard drive, zip disk, USB flash solid state drive or magnetic tape and store it separately from your PC Your data is much more valuable than your computer equipment - it’s priceless You can protect your PC equipment with insurance, but this will not replace your data! Pass ECDL4

Backing Up Data Backups should have a schedule e.g. taken every hour, every day etc State what media you will save it on State where the backups are kept Specify how data can be recovered from backup

Archiving Archiving is a backup that is taken in case the original is lost. Archives are the backups that are not needed in the immediate short term but maybe required for future reference Instead of saving these files on computer it is better to save them on backing removable storage (as mentioned previously) and store them in a fireproof building away from the main site

Protecting data from accidental destruction User errors – untrained users may accidently delete files or save work over other work Fire – use smoke alarms to detect fires early Flood damage – don’t locate computers on the ground floor Power loss – Use an auxiliary power supply that comes on when the main supply cuts out Test new software - so that it doesn’t crash the current system

Protecting data from deliberate destruction Ensure authorisation levels are in place. Access rights so that people higher up the organisation can access more data. Also the rights could be restricted to read only access, allow deletion or read/write access. User names and passwords are in place to prevent unauthorised access. Passwords should be a mix of numbers, letters and symbols and changed regularly Use CCTV Use virus checkers to check information is not corrupted Firewalls to prevent hackers from accessing data from the internet Use biometric methods e.g. fingerprinting, retina scanning, face recognition

Encrypting and monitoring Software & Transaction logs Encryption – is the process of coding files before they are sent over networks/internet to protect them from hackers. Also coding information on the pc so if the computer is stolen files cannot be read. Monitoring software monitors network usage for unusual activity e.g. entering lots of passwords to try and gain access, this would then lock them out of the network Transaction logs – they monitor usage and produce an audit trail e.g. a deleted file will have the date and time of deletion and which member of staff deleted it

Encryption Example When you put in your card or bank details the website converts these into code using an algorithm (a program written specifically to do this). So instead of transmitting your card details via your phone line to the store server it sends the encoded details instead. At the other end the receiving computers must have the same piece of software (algorithm) and a ‘KEY’. The ‘KEY’ is like a password which tells the system how to decode the information. In theory even if someone intercepts (steals) this data then they won’t be able to access your bank details as they don’t have the key.

Ways of protecting you and your computer and network There are now many company's offering users different packages to protect and prevent your computer and or network. Most of theses packages detect, quarantine and delete infected files And some monitor the websites accessed and links to other servers and or networks.

Computer Viruses Viruses are small programs which are designed to cause damage to a computer or whole networks. They can delete files, programs etc They can also spy on your online use. Examples Trojans, boot sector, key logging software tracks what you are typing e.g. a password etc Your PC can catch a virus by sharing files on disks/CDs, viewing/downloading files on the web, USB flash drives and from e-mail attachments (these may contain EXE. Files) The only protection against this is having anti-virus software installed on your machine Pass ECDL4

Protection against viruses Scan files for viruses before opening them Make sure you keep your antivirus software up to date – 300 viruses are released into the wild every month – it only takes one to wreak havoc on your computer. Run a scan regularly. If on broadband, install a firewall to keep hackers away from your personal data. These help to filter out unauthorised requests from outside users. Pass ECDL4

Malware Malicious software Programs that can alter systems software to redirect it to other sites Take over your computer remotely Programs that make your computer run slow Programs that make your computer freeze or crash Pass ECDL4

Physical security for a network As well as security software you will need to protect your network in more conventional ways i.e. lock and key. Fire protection- fire doors, smoke doors, fire proof safes est. Alarms-rooms containing the server should be alarmed Locks-all rooms with services inside and have limited recorded access to them Visibility-avoid putting computers on ground flour and where they are visible to passes bye

For a company being hacked into can have various consequences, some of which can be seen below For personal users it can be just as serious but for other reasons!!