Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
By: Jack, Anna, Cassidy and Patrick October 7, 2008.
Thank you to IT Training at Indiana University Computer Malware.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Security, Privacy, and Ethics Online Computer Crimes.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
Video Following is a video of what can happen if you don’t update your security settings! security.
Protecting ICT Systems
Disaster Planning and Security Policies. Threats to data DeliberateTerrorism Criminal vandalism/sabotage White collar crime Accidental Floods and fire,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
General Purpose Packages
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
IT Security for Users By Matthew Moody.
Computer Security By Charlotte Foster 8P Computer viruses are small software programs that are designed to spread from one computer to another and to.
1.1 System Performance Security Module 1 Version 5.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Security and backups GCSE ICT.
By Alexander smart. What is a viruses ? A Computer Virus is a software program that is designed to copy itself over and over again. Viruses do NOT damage.
Computer Ethics, Viruses, and Copyrights Ethical Computer Use Using computers for positive purposes Using computers for positive purposes  New technologies.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Types of Electronic Infection
Security Training USAID Information Security.
Made by : Mohamed kullab DR. Sanaa el sayegh.  Most personal computers are now connected to the Internet and to local area networks, facilitating the.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Computer security By Shreya Houji. VirusesViruses.
Networked Information Systems Network Security. Network Physical Security File server failure can severely affect network users. Server security: Locked.
Computer Security! Emma Campbell, 8K VirusesHackingBackups.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Back ups Megan Wilkinson. What data can be held on a computer? Personal data / files: 1.Bank info 2. address and passwords 3.Bank passwords and wage.
All about viruses, hacking and backups By Harriet Thomas.
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )
A Computer Virus is a software program that is designed to copy itself over and over again and to attach itself to other programs. They don’t affect hardware,
Storage, Communication & Disposal of data & information Threats to data & Information Deliberate, accidental & technical failure.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
8 – Protecting Data and Security
Chapter 40 Internet Security.
Handling Personal Data
Computer virus Topic: Prepared For Salmeen Rahman Prepared By
Planning and Security Policies
Data integrity and security
Backup and restoration of data, redundancy
Unit 4 IT Security Kerris Davies.
How it affects policies and procedures
G061 - Network Security.
Presentation transcript:

Security The Kingsway School

Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental deletion Disasters such as fires e.g. 9-11

Security Data is the most important thing to most businesses. The loss of this data could threaten an organisation’s existence. Security can be looked at from two angles: Guarding against accidents Guarding against Malicious and Criminal activities

Malicious Acts Hacking The unauthorised accessing of files. Damage may be caused by deliberate or accidental deletions. Data often needs to be kept secure. Viruses Viruses are computer programs designed to copy themselves and attach to other files. Malicious Employees Employees sometimes cause deliberate damage.

Dealing with Malicious Acts Physical Protection Locking rooms Security Guards Keep sensitive information on stand alone machines not on networks. Alarm systems, video cameras

Dealing with Malicious Acts Software Protection Make files read only Hide files for minimal protection Password protect the network Change passwords regularly Password protect screen savers Data Encryption- data is scrambled before transmission and can only be unscrambled with the correct decode software. Levels of Access-Step passwords to reduce rights. Firewalls-to prevent software access to a PC.

Dealing with Viruses Prevention Don’t allow employees to bring in floppy disks Use filtering software to prevent downloads Scan incoming s Update virus software Do not open suspicious s

Backing Up Important data must be regularly backed up in case a server becomes unusable. Usually done onto tape and the tapes must be stored off site. Online backups are convenient. The data is uploaded onto a server somewhere else. You should always save your work into at least two separate places.