Other pages in this set

Page 2

Preview of page 2

Here's a taster:

Issues of privacy
Everyone has a right to privacy ­ the right not to have details
about our lives to be held or circulated without our knowledge.…read more

Page 3

Preview of page 3

Here's a taster:

Information systems depend on:
Data integrity
­ The correctness of the data. Data held in a computer system
may become incorrect, corrupted or of `poor quality' in many
different ways and at many stages during data processing.
· Errors on input
· Errors in operating procedure
· Program errors
Data security
­ The safety of the data.…read more

Page 4

Preview of page 4

Here's a taster:

Increasing data integrity
Standard clerical procedures may be documented and followed
for both input and output.…read more

Page 5

Preview of page 5

Here's a taster:

Increasing data security
Write-protecting disks
User IDs and passwords
Access rights
Counteracting fraud
Protecting against viruses
Communications security
Disaster planning…read more

Page 6

Preview of page 6

Here's a taster:

User Ids and passwords
Usually give access rights to systems
­ Passwords must be at least 6 characters
­ Password display must be automatically
suppressed
­ Files containing passwords must be encypted
­ Passwords should be:
· Kept confidential
· Not written down
· Not be easily guessed words
· Changed regularly ­ at least every 3 months…read more

Page 7

Preview of page 7

Here's a taster:

Access Rights
In most systems it is not usually necessary for any
individual user to have access to all data on a
database
­ Passwords will hold details of access modes
· Read-Only
· Read/Write
· No Access
­ Data may only be accessible at certain times
­ This ensures that users will only have access to records
that are allowed to see, and may only modify records if
they are authorised to do so.…read more

Page 8

Preview of page 8

Here's a taster:

Counteracting Fraud
Fraud, malicious damage, or theft of software or data, may
be due to disgruntled employees.…read more

Page 9

Preview of page 9

Here's a taster:

Protection against viruses
New software should be in tamper-proof
packages
Disallow use of floppy diskettes to
import/export software
Use anti-virus software to
­ check all floppy disks before use
­ Scan emails before they are accepted
­ Disallow email attachments…read more

Page 10

Preview of page 10

Here's a taster:

Biometric measures
Biometric methods do not depend upon
passwords.…read more

Comments

Mr A Gibson

Number one of three presentations which provide a good overview of this topic area.

Resource 1 - Security of Data - this resource

Resource 2 - Computer Crime

Resource 3 - Protecting ICT Systems

Download these to your mobile device and review on the go!

Similar ICT resources:

See all ICT resources »See all resources »