Storage, Communication & Disposal of data & information Threats to data & Information Deliberate, accidental & technical failure.

Slides:



Advertisements
Similar presentations
The IT Workplace Kaye Burton & Karen Le Rossignol Communication in an IT Environment (2000)
Advertisements

Unit 1 Living in the Digital WorldChapter 1 Lets Communicate Internet Safety.
By: Jack, Anna, Cassidy and Patrick October 7, 2008.
Section C Threats to Data.
Let’s Talk About Cyber Security
POSSIBLE THREATS TO DATA
What are computer viruses and its types? Computer Viruses are malicious software programs that damage computer program entering into the computer without.
Security Strategy. You will need to be able to explain:  Data Security  Data Integrity and  Data Privacy  Risks  Hacking  Denial of Service DOS.
COMP6005 An Introduction to Computing Session One: An Introduction to Computing Security Issues.
A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.
Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Crime and Security in the Networked Economy Part 4.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Information System protection and Security. Need for Information System Security §With the invent of computers and telecommunication systems, organizations.
Higher Computing Computer Systems S. McCrossan Higher Grade Computing Studies 6. Using Networks 1 Network Hardware - Hub Hub - A hub is used when you have.
Managing Information Systems Information Systems Security and Control Part 1 Dr. Stephania Loizidou Himona ACSC 345.
Hackers They can u Read the data files u Run the application programs u Modify some files which may cause damages Individuals who gain unauthorized access.
Security, Privacy, and Ethics Online Computer Crimes.
Security strategy. What is security strategy? How an organisation plans to protect and respond to security attacks on their information technology assets.
By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
Data Security Unit F. Objectives Know What Can Go Wrong Explore Data Security Issues Introduce Computer Viruses Understand How viruses Spread Restrict.
Data Security GCSE ICT.
Security The Kingsway School. Accidental Data Loss Data can be lost or damaged by: Hardware failure such as a failed disk drive Operator error e.g. accidental.
1 Pertemuan 10 Understanding Computers Security Matakuliah: J0282 / Pengantar Teknologi Informasi Tahun: 2005 Versi: 02/02.
Protecting ICT Systems
Disaster Planning and Security Policies. Threats to data DeliberateTerrorism Criminal vandalism/sabotage White collar crime Accidental Floods and fire,
GOLD UNIT 4 - IT SECURITY FOR USERS (2 CREDITS) Cameron Simpson.
ISNE101 Dr. Ken Cosh Week 14. This Week  Challenges (still) facing Modern IS  Reliability  Security.
Unit 2 - Hardware Computer Security.
1 I.Assets and Treats Information System Assets That Must Be Protected People People Hardware Hardware Software Software Operating systems Operating systems.
Malware  Viruses  Virus  Worms  Trojan Horses  Spyware –Keystroke Loggers  Adware.
Your Interactive Guide to the Digital World Discovering Computers 2012.
1.1 System Performance Security Module 1 Version 5.
Prepared by: Dinesh Bajracharya Nepal Security and Control.
C8- Securing Information Systems
Computer Threats Cybercrimes are criminal acts conducted through the use of computers by cybercriminals. © 2009 Prentice-Hall, Inc. 1.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
Information Technology Software. SYSTEM SOFTWARE.
Computer Crimes 8 8 Chapter. The act of using a computer to commit an illegal act Authorized and unauthorized computer access. Examples- o Stealing time.
Chapter 8 Computers and Society, Security, Privacy, and Ethics
12015/10/20 Muhammad Salman University of Indonesia.
Data protection This means ensuring that stored data does not get changed, removed or accessed accidentally or by unauthorised people. Data can be corrupted,
Chapter 8 Security Issues and Ethics in Education Chelsea Peugh Chelsea Evans.
SECURITY OF DATA By: ADRIAN PERHAM. Issues of privacy; Threats to IT systems; Data integrity; Standard clerical procedures; Security measures taken to.
Learning Objectives Demonstrate why info systems are vulnerable to destruction, error, abuse, quality control problemsDemonstrate why info systems are.
Database Security Tampere University of Technology, Introduction to Databases. Oleg Esin.
Computer security By Isabelle Cooper.
Topic 5: Basic Security.
Computer security virus, hacking and backups. Computer viruses are small software programs that are designed to spread from one computer to another.
CONTENTS What is Virus ? Types of computer viruses.
Computer Skills and Applications Computer Security.
Computer Systems Viruses. Virus A virus is a program which can destroy or cause damage to data stored on a computer. It’s a program that must be run in.
Catholic University College of Ghana Fiapre-Sunyani INFORMATION TECHNOLOGY I Audrey Asante, Faculty of ICST Data Protection and Security Computers and.
CONTROLLING INFORMATION SYSTEMS
Security and Ethics Safeguards and Codes of Conduct.
VIRUSES AND SECURITY  In an information-driven world, individuals and organization must manage and protect against risks such as viruses, which are spread.
C OMPUTER C RIMES “Criminal activity directly related to the use of computers, specifically illegal trespass into the computer system or database of.
NETWORK SECURITY Definitions and Preventions Toby Wilson.
Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.
Computer Security & Backups LO: Understanding the need for computer security and typical ways to ensure that a system is secure. Learning Outcome : Define.
MUHAMMAD GHAZI AIMAN BIN MOHD AIDI. DEFINITION  A computer virus is a malware program that, when executed, replicates by inserting copies of itself (possibly.
PCs ENVIRONMENT and PERIPHERALS Lecture 10. Computer Threats: - Computer threats: - It means anything that has the potential to cause serious harm to.
Security, Ethics and the Law. Vocabulary Terms Copyright laws -software cannot be copied or sold without the software company’s permission. Copyright.
8 – Protecting Data and Security
IT Security  .
Computer Security Computer viruses Hardware theft Software Theft Unauthorized access by hackers Information Theft Computer Crimes.
Chapter Nine (Part 1).
CHAPTER 2: OPERATING SYSTEMS (Part 2) COMPUTER SKILLS.
Presentation transcript:

Storage, Communication & Disposal of data & information Threats to data & Information Deliberate, accidental & technical failure

Deliberate threats Intentional Damage –Computer viruses, payload is the action virus designed to carry out Worms, attaching themselves to messages, clog servers Viruses prevents computer from running executable files, destroy data Viruses mainly spread through file attachment or transfer of infected files Macro is most common form of virus –Hacking/Cracking Hackers gain unauthorised access and view data but not tamper Crackers gain unauthorised access to damage, alter, destroy or steal data

Security, Intentional Damage Tampering with files –Crackers –Files changed by personnel with access rights who sell information to others –Files intercepted whilst being transmitted Theft of information & hardware & vandalism

Security, Accidental damage User error –Copying older version of file over newer version –Formatting a disk containing data –Not correctly shutting down hardware –Failure to follow file-management procedures Descriptive filenames File extensions left off Folders improperly used –Equipment failure/damage

Technical Failure Examples of: –Hard disk fails –Operating system not working properly –Damage by electricity –Fire, smoke, water –breakage

Consequences of data security violation and privacy measures Consequences of data security violation –Breaches of privacy –Loss of intellectual property –Loss of income