Protecting ICT Systems

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Possible Threats To Data. Objectives To understand: Types of threats Importance of security Preventative and remedial actions Personal safety This will.
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
E-Commerce Security Issues. General E-Business Security Issues Any E-Business needs to be concerned about network security. The Internet is a “ public.
Managing Information Systems Information Systems Security and Control Part 1 Dr. Stephania Loizidou Himona ACSC 345.
Security, Privacy, and Ethics Online Computer Crimes.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
9 99 CHAPTER Privacy and Security - FAQ’s. 9 © The McGraw-Hill Companies, Inc Privacy How secure is data –On system –On Internet Private network.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Lesson 9-Securing a Network. Overview Identifying threats to the network security. Planning a secure network.
Factors to be taken into account when designing ICT Security Policies
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Presented by Manager, MIS.  GRIDCo’s intentions for publishing an Acceptable Use Policy are not to impose restrictions that are contrary to GRIDCo’s.
The laws Organizations are covered by lots of different laws
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Disaster Planning and Security Policies. Threats to data DeliberateTerrorism Criminal vandalism/sabotage White collar crime Accidental Floods and fire,
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Defining Security Issues
© Paradigm Publishing Inc. 8-1 Chapter 8 Security Issues and Strategies.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
1.1 System Performance Security Module 1 Version 5.
Security and backups GCSE ICT.
© Hodder Gibson 2012 Staying safe online. © Hodder Gibson 2012 Dangers on the Internet There are a number of dangers on the Internet such as: viruses.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.
Computer Security By Rachel Gaines. Computers are used for work, play, and everything in between. So here’s how to keep it fun and protected.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Chapter 2 Securing Network Server and User Workstations.
Small Business Security Keith Slagle April 24, 2007.
Data Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Network Security & Accounting
Security Policies. Threats to security and integrity  Threats to information systems include  Human error –keying errors, program errors, operator errors,
Cyber Safety Mohammad Abbas Alamdar Teacher of ICT STS Ajman – Boys School.
CONTROLLING INFORMATION SYSTEMS
Security and Ethics Safeguards and Codes of Conduct.
1 AQA ICT AS Level © Nelson Thornes Firewalls and Virus Checkers.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
Computer Security Sample security policy Dr Alexei Vernitski.
COMPUTER SYSTEM FUNDAMENTAL Genetic Computer School COMPUTER AND INTERNET SECURITY LESSON 9.
Implementing a Security Policy JISC – ICT Security Threats & Promises, April 2002 Mick Ismail ICT Services Manager City of Wolverhampton College.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Security on Peer-to-Peer Networks.
Philip J. Beyer, Information Security Officer John P. Skaarup, Sr. Security Engineer Texas Education Agency Information Security.
ANS File Security Chapter # 29 ( Prepared by : Mazhar Javed ) 1 Data Security “Protection against loss, corruption of, or unauthorized access of data”
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
UNIT V Security Management of Information Technology.
8 – Protecting Data and Security
Chapter 40 Internet Security.
Unit 13 IT Systems Troubleshooting and Repair Anne Sewell
AS ICT Module 2 Objectives: Security of Data
UNIT 19 Data Security 2.
Lecture 14: Business Information Systems - ICT Security
Planning and Security Policies
Web Servers / Deployment
Unit 4 IT Security Kerris Davies.
Operational procedures for preventing misuse
What is Information Security?
G061 - Network Security.
Presentation transcript:

Protecting ICT Systems

Internal & external threats Data & programs are vulnerable to both deliberate and accidental damage, ranging from: A floppy disk which becomes unusable To hackers stealing millions from a major organisation Internal threats: Hardware failure Faulty procedures Natural disasters Remote systems or laptops may be lost or not properly operated in terms of back-ups and regular maintenance Dishonest employees External threats Hackers Viruses

Measures to protect systems Physical restrictions Login procedures – UserID and passwords Levels of access Audit software Encryption

Types of backup Online backup Periodic backups Backup of laptop data Often simultaneous update of 3 systems – one remote from the other 2 Periodic backups Daily – stored off-site in a fireproof safe Possible now to back up to internet providers Backup of laptop data Protects business in the event of loss or failure of machine

Other measures Virus checkers Regular update of virus template is required to combat new viruses Responsible companies do not allow downloads from internet or execution of attachments to e-mail Careful vetting of staff Comprehensive staff training Considered siting of computer equipment to avoid basic disasters like flooding

Internet access issues Internet contains much unsuitable material Schools must guard against: Pupils accessing pornographic materials Participation in chat rooms where pupils may be exposed to undesirable strangers Business may want to control use of e-mail Some organisations achieve this by installing and maintaining their own intranet (private internet) They have a firewall to prevent unsuitable material being downloaded This consists of a proxy server with special hardware and software to maintain security.