Information Collection, Storage and Sharing. The use of computers have made it easier than before, to collect, store and share large amounts of information.

Slides:



Advertisements
Similar presentations
GCSE ICT Networks & Security..
Advertisements

By: Jack, Anna, Cassidy and Patrick October 7, 2008.
Thoughts on Technology Issues for Small Business Data Security for Mobile Access Devices.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
9 - 1 Computer-Based Information Systems Control.
Security: Playing in Safe By: Matt Hill Identification and Access Identification and Access | When Disaster Strikes | Disaster Recovery Plan | Software.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Locking the Backdoor: Computer Security and Medical Office Practice Dr. Maury Pinsk, FRCPC University of Alberta Division of Pediatric Nephrology.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Copyright © 2006 by The McGraw-Hill Companies,
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Sixth Edition 1 M a n a g e m e n t I n f o r m a t i o n S y s t e m s M a n a g I n g I n f o r m a t i o n T e c h n o l o g y i n t h e E – B u s i.
ITS Offsite Workshop 2002 PolyU IT Security Policy PolyU IT/Computer Systems Security Policy (SSP) By Ken Chung Senior Computing Officer Information Technology.
Computer Security 1 Keeping your computer safe. Computer Security 1 Computer Security 1 includes two lessons:  Lesson 1: An overview of computer security.
Saving Your Business from a Data Loss Randy Clark.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Keeping Data Safe Revision Summer How many ways can data be lost? Start a list… Physical Loss or Corruption of data Accidental or Deliberate Unauthorised.
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict.
UNIT 3C Security of Information. SECURITY OF INFORMATION Firms use passwords to prevent unauthorised access to computer files. They should be made up.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
Protecting ICT Systems
CHAPTER 4 Information Security. CHAPTER OUTLINE 4.1 Introduction to Information Security 4.2 Unintentional Threats to Information Security 4.3 Deliberate.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
GCSE ICT Viruses, Security & Hacking. Introduction to Viruses – what is a virus? Computer virus definition - Malicious code of computer programming How.
Course ILT Computers and society Unit objectives Identify the main uses of computers in daily life, and identify the benefits of using Describe.
1.1 System Performance Security Module 1 Version 5.
Security and backups GCSE ICT.
COMPUTER CARE & MAINTENANCE. Protecting Your Computer From Damage Like any kind of equipment, your computer requires care and maintenance to run smoothly.
Asset & Security Management Chapter 9. IT Asset Management (ITAM) Is the process of tracking information about technology assets through the entire asset.
Ways to organize electronic files Witness fitness By: Simran and Navneet.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
OCR Cambridge National ICT Mr Conti 10X 25 th April 2014.
Advanced CIS NAME: ___________________. OBJECTIVE: Maintaining, Managing, and Troubleshooting Systems Maintenance includes following established procedures.
Madison Security Systems. Computer Viruses Types of Viruses  Nuisance Viruses  Data-Destructive Viruses  Espionage Viruses  Hardware-Destructive.
Northland Security Systems. Computer Viruses Types of Viruses  Nuisance viruses  Data-destructive viruses  Espionage viruses  Hardware-destructive.
3.3 Digital Communication Security. Overview Demonstrate knowledge and understanding of basic network security measures, e.g. passwords, access levels,
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
Files are at risk from loss if your computer breaks or if you get a virus. Files can also become corrupted. Solutions: Make regular back ups of files Use.
Robert Crawford, MBA West Middle School.  Explain how to prevent data loss  Describe how to use antivirus programs  Discuss ways of backing up data.
Computer Literacy BASICS
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
System utility pieces of software. Antivirus Antivirus (or anti-virus) software is used to safeguard a computer from malware, including viruses, computer.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
Pembroke Pines Charter Middle School Central Campus Proudly Presents Technology Night 2013.
G061 - Network Security. Learning Objective: explain methods for combating ICT crime and protecting ICT systems.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Ensuring Network Security Making Networks Secure Maintaining a Healthy Network Environment Avoiding Data Loss 1.
SECURITY OF INFORMATION Unit 3c. Click to return to Sum up page HOW TO PROTECT DATA AND COMPUTERS Computers can be locked in a room CCTV and alarms to.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Data Security.
Data Security. Unauthorized Access Natural disaster Accidentals Destruction ( Hard ware failure )
FIT03.05 Explain features of network maintenance.
1 UNIT 19 Data Security 2. Introduction 2 AGENDA Hardware and Software protect ion Network protect ion Some authentication technologies :smart card Storage.
1 UNIT 19 Data Security 2 Lecturer: Ghadah Aldehim.
Security and Ethics Safeguards and Codes of Conduct.
SECURITY ISSUES. TYPES BLUE JACKING SENDING MESSAGES TO OPEN BLUETOOTH CONNECTION VIRUSES HARMFUL PROGRAMS THAT SPREAD WITHIN DIGITAL DEVICES COOKIES.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
DATA SECURITY (i) Backing up dataBacking up data (ii) Archiving dataArchiving data 4 th JUNE 2005 Saturday Lower Sixth Form Computer Studies.
Learning Intention Security of Information. Why protect files? To prevent unauthorised access to confidential information To prevent virus/corruption.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
Chapter 6 Protecting Your Files
AS ICT Module 2 Objectives: Security of Data
UNIT 19 Data Security 2.
Definition, DIS/Advantages & Services
Unit 4 IT Security Kerris Davies.
Presentation transcript:

Information Collection, Storage and Sharing

The use of computers have made it easier than before, to collect, store and share large amounts of information.

Reasons for Collecting Information The most common reasons of collecting information are: So that the information can be used as a commodity So that the information can be used as a commodity To make tactical and strategic decisions To make tactical and strategic decisions To monitor, control and supervise operations To monitor, control and supervise operations To be informed To be informed

Storing Information Reasons for storing information are: For reference For reference For analysis For analysis As a back-up As a back-up For archives For archives For distribution For distribution

Sharing of Information Information can be shared using: Manual files Manual files Networks Networks or instant messaging or instant messaging CDs and floppy disks CDs and floppy disks

Protecting and Securing Information

Since information is so valuable, considerable effort is spent protecting it from theft, fire, viruses, hackers, data loss and data corruption.

Protecting Information Numerous methods are used to protect and secure information. The most widely used of these methods are: Using passwords Using passwords File encryption File encryption Physical access restriction Physical access restriction Software access restriction Software access restriction

Protecting Information Cont’d Virus protection Virus protection Using fireproof cabinets Using fireproof cabinets Using firewalls Using firewalls Back-up and recovery Back-up and recovery Archiving Archiving

Data Corruption Data may be corrupted by: A computer virus A computer virus Willful acts of employees Willful acts of employees Computer malfunction Computer malfunction Power surges or outages Power surges or outages Poor methods for updating data Poor methods for updating data

Reducing the risk of data corruption Minimizing the risk of computer malfunction by performing periodic computer maintenance and keeping the computer in a cool room away from smoke and dust Minimizing the risk of computer malfunction by performing periodic computer maintenance and keeping the computer in a cool room away from smoke and dust Using surge protectors and uninterrupted power supply units Using surge protectors and uninterrupted power supply units Performing quality control audits to minimize willful corruption Performing quality control audits to minimize willful corruption Installing anti-virus software Installing anti-virus software