1 3 Computing System Fundamentals 3.4 Networked Computer Systems.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

Copyright 2006 Mid-City Offices Systems. Busy people… How would your business be affected, if you suddenly lost all of your computer data? Rush through.
Section C Threats to Data.
Security Strategy. You will need to be able to explain:  Data Security  Data Integrity and  Data Privacy  Risks  Hacking  Denial of Service DOS.
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Networks. User access and levels Most network security involves users having different levels of user access to the network. The network manager will.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
1 MIS 2000 Class 22 System Security Update: Winter 2015.
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Security Security is critical in the storage and transmission of information loss of information can not only cause problems to the organisation but can.
Managing Information Systems Information Systems Security and Control Part 2 Dr. Stephania Loizidou Himona ACSC 345.
Hacking, Viruses and the Copyright Law. Learning Objectives  Describe what Hacking is and what Viruses are.  List what viruses can do and describe how.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Term 2, 2011 Week 3. CONTENTS Network security Security threats – Accidental threats – Deliberate threats – Power surge Usernames and passwords Firewalls.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Week 5 IBS 520 Computer and Online Security. Cybercrime Online or Internet- based illegal acts What is a computer security risk? Computer crime Any illegal.
Security. Introduction to Security Why do we need security? What happens if data is lost? –Wrong business decisions through lack of information –Long-term.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
Security of Data. Key Ideas from syllabus Security of data Understand the importance of and the mechanisms for maintaining data security Understand the.
Network and Internet Security and Privacy.  Two of the most common ways individuals are harassed online are  cyberbullying – children or teenagers bullying.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
1.1 System Performance Security Module 1 Version 5.
Security and backups GCSE ICT.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
ISO27001 Introduction to Information Security. Who has day-to-day responsibility? All of us! Why Information Security? Control risk, limit liability What.
MATSEC Past Papers May 2010 Paper 1 Paper 2A. What is the difference between each of the following pairs of items? Syntax Error Caused by forgetting certain.
1. MAGNETIC HARD DRIVES 2. SOLID STATE DRIVES 3. OPTICAL DISKS 4. FLASH MEMORY 5. CLOUD STORAGE 6. CONNECTIVITY DEVICES Storage and connectivity devices.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Types of Electronic Infection
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Physical ways of keeping your system secure. Unit 7 – Assignment 2. (Task1) By, Rachel Fiveash.
Social and Ethical Issues. Social & Ethical Issues Social and ethical issues arise from the processing of data into information. There are many issues.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Encryption and Hacking By Steph Garrihy. What is Encryption? Encryption is when data is scrambled by software using a preset key so that anyone viewing.
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
Computer security By Isabelle Cooper.
Data Security.
Transferring data.  Most commercial computer users need to allow their employees to share data.  It also needs more than one employee to access the.
Firewall firewalls Is a program on your computer to protect your computer from all types of threats and if you have a server and you wasn’t to protect.
Chap1: Is there a Security Problem in Computing?.
Cmpe 471: Personnel and Legal Issues. Personnel Crime is a human issue not a technological one Hiring On-going management Unauthorised access Redundancy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Bailey Ryan.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
1 3 Computing System Fundamentals 3.6 Errors Prevention and Recovery.
Errors!. Where do errors occur? Anywhere data is transferred, processed, stored, etc. Input user error Storage magnetic hard drive errors physical tampering.
Deck 10 Accounting Information Systems Romney and Steinbart Linda Batch March 2012.
Networks. Learning Objectives: By the end of this lesson you should be able to:
Don’t Log in!. Recap on the previous units I’ve tried to make it as concise as possible but there is a bit of writing, to ensure that you have some notes.
Computer Networks. Computer Network ► A computer network is a group of computers that are linked together.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
1 6 Further System Fundamentals (HL) 6.4 Further Network Fundamentals.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
Information Systems Design and Development Security Precautions Computing Science.
Protection of Data 31 Protection of Data 31. Protection of Data 31 Having looked at threats, we’ll now look at ways to protect data: Physical Barriers.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
UNIT V Security Management of Information Technology.
8 – Protecting Data and Security
Chapter 40 Internet Security.
UNIT 4 NETWORK ENVIRONMENTS.
Uses Of Encryption Algorithms
Security of Data  
WJEC GCSE Computer Science
G061 - Network Security.
Presentation transcript:

1 3 Computing System Fundamentals 3.4 Networked Computer Systems

3.4.5 Data Integrity and Security

3 Security and integrity Both relate to protection of data during storage and/or transmission Security – prevention of deliberate theft, damage or unauthorised access. Integrity – maintenance of accuracy despite natural events (hardware failure, data entry error, fire...)

4 Physical security Networks create security problems - physical security can be maintained by: ‣ an administrator not leaving an office unattended when logged on to a network server, ‣ security code on the door, ‣ CCTV cameras.

5 Logical security Logical security is built into operating systems, preventing unauthorised access User ID/passwords deny access to systems. Permissions/privileges limit the scope of actions people can take with the system e.g. a low-level clerk might not be able to copy sensitive files to a local flash drive.

6 Logical security Passwords must be: ‣ of a reasonable length (6 characters or more), ‣ hard to guess (not a name or word) and ‣ containing symbols besides alphabetic characters. e.g.

7 Hacker or cracker? A hacker is someone who is talented at and enjoys solving technical problems. A cracker tries to break into networks for which they have no authorisation - they may come from outside the organisation or be internal e.g.. disgruntled employees.

8 Security records The network OS maintains a detailed security log. Alert systems give details of who has accessed what parts of the system and when. Social ‘hacking’ is now the greater security risk.

9 Encryption Especially sensitive data (financial transfers, police data on suspects, government military secrets) should be encrypted for transmission and storage. Encryption is the mathematical scrambling of data into apparent random noise (which only the intended recipients can decrypt). Early codes required the transmission of a key by some other means.

10 Encryption Early encryption (pre-1990’s) required the transmission of a key by some other means. Modern encryption is asymmetric - data (e.g. credit card number) can be encrypted with a public key and can then only be decrypted by the holder of the corresponding private key. Examples: secure web browsing (https), encrypting , WPA encryption of wifi networks.

11 Backup Important data should be regularly backed up and stored in a safe place (off-site if it is vital to the continued operation of the business). Good advice is: ‣ 3 copies of all data, ‣ 2 different media and ‣ 1 of them offsite.

12 Checking integrity Check digits and parity bits. Batch totals and checksums. Error detection and correction algorithms are complex and may be part of network protocol. Some of the above allow self-correction; generally, error detection leads to a request for retransmission.

13 Quality of transmission Cables are less susceptible to interference (‘noise’) than radio (although mains electricity cable nearby may interfere). Digital signals are less prone to noise than old analogue ones, so can use narrower frequency ranges and faster transmission (less retransmission) over radio. Optic fibre is most reliable e.g. not susceptible to lightning strikes.