Presentation is loading. Please wait.

Presentation is loading. Please wait.

Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc.

Similar presentations


Presentation on theme: "Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc."— Presentation transcript:

1 Protecting Data

2 Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc

3 Threats to computer systems Data Integrity Fraudulent use / Malicious Damage Viruses

4 Data Integrity The correctness of data –Data may become incorrect or corrupted during: Data Entry Errors in operating procedure (update program x2) Program Errors

5 Improving data integrity Data entered by authorised personnel only Data must be verified Output should be checked for reasonableness Printed output should be shredded after use

6 Protecting Data Write-Protect disks Each user has an ID & Password –Password at least 6 characters & contain 1 number –Password display surpressed –Files that contain passwords must be encrypted –Confidential passwords –Regular password changes

7 Access Rights Only see data needed –Doctor see own patients –Doctors receptionist not see medical history Only make changes if authorised Only certain stations make changes –Password only changed at specific machine

8 Access Rights (2) DataAccess RightTerminalTimesSecurity Level Customer IDRead Only04, 050830-18007 Credit LimitRead Write040830-180010 PaymentRead / Write04, 051830-210010 Credit RatingNo Access030000-23590

9 Fraudulent Use! Vett Employees Immediate removal of sacked employed Separation of duties (more than 1 person involved in a process) Use of passwords (allows audit trail)

10 Fraudulent Use (2) Educate Staff –Challenge visitors –Shred output –Log-off –Lock doors –Employ a security manager to monitor staff & terminals and log statistics.

11 Virus Protection Make sure all software is sealed before use Do not allow floppy disks (This will also prevent unauthorised data removal) Scan E-Mail for viruses (disallow attachments?) Run regular anti-virus software scans (make sure your virus definitions are up to date)

12 Physical Security Prevention of access to computer areas (cards, badges, locks) Visitors to wear badges CCTV Alarm Systems

13 Security Procedure Use a floppy drive lock Use a virus check Do not allow anyone else to use your computer (even at home) Back-up regularly

14 Biometric Security Passwords only as effective as their owner! –Written Down –Blu-tacked to the monitor –Obvious (name, dob, password) Fingerprint Iris Scanners

15 Other Problems Fire Flood Power surge Accidental damage The deliberate damage we have been talking about

16 Newer problems! Internet –Snooping / Hacking –Microsoft code loss!! E-Mail E-Mail –Theft of data –Viruses –Time Wasting

17 Disaster Planning No matter what precautions are taken, things will go wrong! –Backup (see later in the course) –Recovery Plan Identify alternative computer equipment Restore data Identify alternative office space Make provision for alternative communication links


Download ppt "Protecting Data. Privacy Everyone has a right to privacy Data is held by many organisations –Employers –Shops –Banks –Insurance companies –etc."

Similar presentations


Ads by Google