Download presentation
Presentation is loading. Please wait.
1
Protecting ICT Systems
2
Internal & external threats
Data & programs are vulnerable to both deliberate and accidental damage, ranging from: A floppy disk which becomes unusable To hackers stealing millions from a major organisation Internal threats: Hardware failure Faulty procedures Natural disasters Remote systems or laptops may be lost or not properly operated in terms of back-ups and regular maintenance Dishonest employees External threats Hackers Viruses
3
Measures to protect systems
Physical restrictions Login procedures – UserID and passwords Levels of access Audit software Encryption
4
Types of backup Online backup Periodic backups Backup of laptop data
Often simultaneous update of 3 systems – one remote from the other 2 Periodic backups Daily – stored off-site in a fireproof safe Possible now to back up to internet providers Backup of laptop data Protects business in the event of loss or failure of machine
5
Other measures Virus checkers
Regular update of virus template is required to combat new viruses Responsible companies do not allow downloads from internet or execution of attachments to Careful vetting of staff Comprehensive staff training Considered siting of computer equipment to avoid basic disasters like flooding
6
Internet access issues
Internet contains much unsuitable material Schools must guard against: Pupils accessing pornographic materials Participation in chat rooms where pupils may be exposed to undesirable strangers Business may want to control use of Some organisations achieve this by installing and maintaining their own intranet (private internet) They have a firewall to prevent unsuitable material being downloaded This consists of a proxy server with special hardware and software to maintain security.
Similar presentations
© 2024 SlidePlayer.com Inc.
All rights reserved.