Data Protection LO4: How legal, ethical, safety and security issues affect how computers should be used IR Photography would like you to create a document.

Slides:



Advertisements
Similar presentations
Providing protection from potential security threats that exist for any internet-connected computer is termed e- security. It is important to be able to.
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
POSSIBLE THREATS TO DATA
Online Safety. Introduction The Internet is a very public place Need to be cautious Minimize your personal risk while online Exposure to: viruses, worms,
Data Security and legal issues Starter :- 5 Minutes Make a list of all the companies and organisations that you believe holds data on you. Write down what.
Legislation & ICT By Savannah Inkster. By Savannah Computer Laws 1.Data Protection ActData Protection Act 2.Computer Misuse ActComputer Misuse Act 3.Copyright,
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Security, Privacy, and Ethics Online Computer Crimes.
Threats To A Computer Network
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Wonga example Register Question- What risks do you think businesses face due to IT developments?
INTERNET THREATS AND HOW TO PROTECT YOUR COMPUTER -BRIAN ARENDT.
Title: The Internet LO: Security risks. Security risks Types of risks: 1.Phishing 2.Pharming 3.Spamming 4.Spyware 5.Cookies 6.Virus.
Viruses & Destructive Programs
The Legal Framework Can you work out which slide each bullet point should go on?!
Threats to I.T Internet security By Cameron Mundy.
Issues Raised by ICT.
Internet safety By Lydia Snowden.
Internet safety Viruses A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your.
Viruses & Security Threats Unit 1 – Understanding Computer Systems JMW 2012.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
General Purpose Packages
Enw / Name. How legislation affects business computer users How important is health and safety legislation to a business and how does it affect a workers.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Safe Computing. Computer Maintenance  Back up, Back up, Back up  External Hard Drive  CDs or DVDs  Disk Defragmenter  Reallocates files so they use.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Liam Bradford.
Section 6 Theory Software Copyright, Viruses and Hacking.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
IT security By Tilly Gerlack.
I.T Security Advice for Dummies By Kirsty Pollard Kirsty Pollard Campsmount Academy.
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Thomas Jenkins.
OCR Cambridge National ICT Mr Conti 10X 25 th April 2014.
ARE YOU BEING SAFE? What you need to know about technology safety Shenea Haynes Digital Citizenship Project ED 505.
 A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. It is deliberately.
Here is a list of viruses Adware- or advertising-supported software-, is any software package which automatically plays, displays, or downloads advertisements.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Why the Data Protection Act was brought in  The 1998 Data Protection Act was passed by Parliament to control the way information is handled and to give.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
James McQuillen. Data protection Act 1998 The main aim of it is to protect people's fundamental rights and freedom to a particular right to privacy of.
Topic 5: Basic Security.
Internet Safety Internet Safety LPM
Security Risks Viruses, worms, Trojans Hacking Spyware, phishing Keylogging Online fraud Identity theft DOS (Denial of Service attacks.
Computer Skills and Applications Computer Security.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Internet safety By Suman Nazir
MANAGING RISK. CYBER CRIME The use of the internet and developments in IT bring with it a risk of cyber crime. Credit card details are stolen, hackers.
Understand Malware LESSON Security Fundamentals.
How these affect the use of computers. There are 4 main types of legislation that affect the use of computers. 1.Data Protection Act 2.Copyright 3.Computer.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
ICT and the Law Mr Conti. Did you see anything wrong with that? Most people wouldn’t want that sort of information posted in a public place. Why? Because.
Candidates should be able to:  describe the purpose and use of common utility programs for:  computer security (antivirus, spyware protection and firewalls)
1 Law, Ethical Impacts, and Internet Security. 2 Legal Issues vs. Ethical Issues Ethics — the branch of philosophy that deals with what is considered.
1 Assignment 3 LO This learning outcome is all about how legal, ethical, safety and security issues affect how computers should be used. All businesses.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Information Systems Design and Development Security Risks Computing Science.
Safety & Security By Kieran Bolko. Laws The main law that you should be taking note of is the Data Protection Act 1998 – this law sets rules for the electronic.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
Primary/secondary data sources Health and safety Security of Data Data Protection Act.
Unit 1 Understanding computer systems: How legal, ethical, safety and security issues affect how computers should be used OCR Cambridge Nationals in ICT.
Technical Implementation: Security Risks
Security Risks Todays Lesson Security Risks Security Precautions
Unit 4 IT Security.
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Computer Applications Unit B
HOW DO I KEEP MY COMPUTER SAFE?
Computer Security.
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
G061 - Network Security.
ONLINE SECURITY, ETHICS AND ETIQUETTES EMPOWERMENT TECHNOLOGY.
Presentation transcript:

Data Protection LO4: How legal, ethical, safety and security issues affect how computers should be used IR Photography would like you to create a document to discuss the features and purposes of computing devices. Data Protection The Data Protection Act (DPA) aims to protect the rights of the owners of data. The Act sets out rules on how data should be stored and used, and provides a means for the owners of data to complain, and sometimes to claim compensation if their data is misused. The main points of the Data Protection Act include: Data must be fairly and lawfully processed Data must be processed for limited purposes Data must be adequate, relevant and not excessive Data must be accurate and up to date Data must not be kept for longer than is necessary Data must be processed in line with your rights Data must be kept secure Data must not be transferred to other countries outside of the European Economic Area (EEA)

Copyright and Computer Misuse LO4: How legal, ethical, safety and security issues affect how computers should be used IR Photography would like you to create a document to discuss the features and purposes of computing devices. Copyright and Computer Misuse CopyrightThe Copyright, Design and Patents Act law makes it illegal to copy a work, for example, a file or image, without permission from the owner or copyright holder. It is also illegal to make unauthorised copies of software. The main ways that this law is commonly broken include: Using software without the correct software licence Downloading files from the internet Copying music, DVDs, CDs and software Computer MisuseThis Act relates to illegal access to files and data stored on computer systems. It was introduced to cope with the increase in hacking and viruses. There are three main parts to this Act (law): Unauthorised access to computer material Accessing computer material with the intent to commit further illegal acts. Acts with intent to damage operation of computers.

Moral and Ethical Issues LO4: How legal, ethical, safety and security issues affect how computers should be used IR Photography would like you to create a document to discuss the features and purposes of computing devices. Monitoring of individuals by organisations Some businesses need to monitor tasks that are being completed. There are several ways in which employees and other individuals (for example, customers) can be monitored: Worker Monitoring/Logging: CCTV and RFID tags can be used to track employees. Cookies: A file downloaded to the computer from a website so that it can be personalised. Cookies can be a problem as they store personal data on the computer. Key Logging: A key logger is a piece of hardware or software that records the real time activity of a computer user including the keyboard keys they press. Worker Call Monitoring/Recording: Many businesses record telephone calls made from and to the business. This enables an audit trail to be kept in case of any issues or questions being raised at a later. Electronic Surveillance: Many businesses offer a loyalty card scheme. Every time a customer shops online or in the store, the loyalty card number is obtained and points are allocated to the account. This gives the business detailed data about customers. Mobile Phone Triangulation: Mobile phone positioning can be used by the emergency services (police, fire, ambulance or mountain rescue) to find the exact location that a call was made. However, finding the position of a mobile phone, and the person using it, can invade the privacy of the phone user.

Threats to Data Security LO4: How legal, ethical, safety and security issues affect how computers should be used IR Photography would like you to create a document to discuss the features and purposes of computing devices. Threats to Data Security Computer VirusesA computer program that can replicate itself and spread from one computer to another. Viruses can increase their chances of spreading to other computers by infecting files on a network file system. TrojansA Trojan often appears to be something which is wanted or needed by the user of a PC but is a stand- alone program designed to give full control of a PC infected with a Trojan to another PC. They can be hidden in valid programs and software. Trojan horses can make copies of themselves, steal information, or harm their host computer systems. WormsA stand-alone computer program that replicates itself so it can spread to other computers. A worm can use a computer network to spread. Unlike a computer virus, it does not need to attach itself to an existing program. Worms almost always cause some harm to a network, even if only by consuming bandwidth.

Threats to Data Security LO4: How legal, ethical, safety and security issues affect how computers should be used IR Photography would like you to create a document to discuss the features and purposes of computing devices. Threats to Data Security PhishingA way of attempting to get information, for example usernames, passwords and credit card details, by pretending to be from a trustworthy source such as a social network or banking website. Phishing is usually carried out by spoofing or instant messaging. Users are often asked to enter details at a fake website which looks just like the proper version. SpywareA type of malware (malicious software) installed on a computer system that collects information about users without their knowledge. Spyware is usually hidden from a user and can be difficult to detect. AdwareAlso known as advertising-supported software. This is any software package that automatically shows adverts, such as a pop up. The main object of adware is to generate money for its author. Adware, by itself, is harmless. However, some adware may include spyware such as key loggers.

Threats to Data Security LO4: How legal, ethical, safety and security issues affect how computers should be used IR Photography would like you to create a document to discuss the features and purposes of computing devices. Threats to Data Security HackingHacking means finding out weaknesses in a system. A computer hacker is a person who finds out weaknesses in a computer system to gain unauthorised access. A hacker may be motivated by a multitude of reasons, such as profit, protest or challenge. Denial of Service Attacks (DoS) This is an attempt to make a computer or network system unavailable to its users. A DOS attack is usually focused on preventing an internet site or service from functioning efficiently or at all, temporarily or indefinitely. The attacks usually target sites or services hosted on high-profile web servers such as banks and payment websites (for example, PayPal). Physical threatsComputer systems consist of physical items such as keyboards, monitors, memory sticks/removable storage devices, base units and servers. These can be lost or stolen very easily – especially memory sticks and portable storage devices.

Task 5 – Learning Outcome 4 Identity Theft Personal Security Firewall Anti-Virus Anti-Spam Data Encryption Internet research LO4: How legal, ethical, safety and security issues affect how computers should be used Create a document to discuss how to work with information and data to meet specific business needs Task 5 (P, M, D) 1 Use your LO4 Task 5 – Actions to Minimise Risks.doc file to record information you are going to research about the points discussed below:LO4 Task 5 – Actions to Minimise Risks.doc 1 1 As computer systems are used to carry out more and more business activities, the threat to the computer systems has increased. The increased use of the Internet as a business tool has also lead to the increased risk of threats. Some important data loss, corruption and theft considerations include: Act appropriately online to reduce Protect Personal Security Protection software, i.e. firewall, anti-virus, anti-spam, Data Encryption to store and transfer data 2 Merit and Distinction: Investigate the advice given by social networking sites about acting safe online.

Action to Minimise Risks LO4: How legal, ethical, safety and security issues affect how computers should be used IR Photography would like you to create a document to discuss the features and purposes of computing devices. Action to Minimise Risks Act appropriately online to reduce and Protect Personal Security Do not share to much information online, especially when on social networking sites, i.e. your date of birth. Use different passwords on different sites. Always check the website for the padlock and https and beware of s that ask for your information. FirewallA firewall is used to help protect a computer system from threats and attacks. This is done by controlling what data can and cannot pass through it. Anti-VirusThis software detects any viruses, including Trojans and worms, and removes them to limit their damage and impact to the computer system. Anti-Spam Spam is the sending of unwanted messages, often advertising, to a large number of addresses. Spam is a serious concern as it can be used to deliver Trojans, viruses, worms, spyware, etc. Data EncryptionThis software encrypts data so that only users who have the unlock code/secret key can read/use the data which has been transmitted.