Pages in this set

Page 1

Preview of page 1
Security of Data

Page 2

Preview of page 2
Issues of privacy
Everyone has a right to privacy ­ the right not to have details
about our lives to be held or circulated without our knowledge.
Data of a personal nature are regularly collected by numerous
different organisations ­ for example:
­ Employers hold personnel records that include data…

Page 3

Preview of page 3
Information systems depend on:
Data integrity
­ The correctness of the data. Data held in a computer system
may become incorrect, corrupted or of `poor quality' in many
different ways and at many stages during data processing.
· Errors on input
· Errors in operating procedure
· Program errors
Data…

Page 4

Preview of page 4
Increasing data integrity
Standard clerical procedures may be documented and followed
for both input and output.
Input
­ Data entry must be limited to authorised personnel only
­ In large volume data entry, data may be verified (keyed in twice by
different operators) to guard against keying errors
­ Data…

Page 5

Preview of page 5
Increasing data security
Write-protecting disks
User IDs and passwords
Access rights
Counteracting fraud
Protecting against viruses
Communications security
Disaster planning

Page 6

Preview of page 6
User Ids and passwords
Usually give access rights to systems
­ Passwords must be at least 6 characters
­ Password display must be automatically
suppressed
­ Files containing passwords must be encypted
­ Passwords should be:
· Kept confidential
· Not written down
· Not be easily guessed words
·…

Page 7

Preview of page 7
Access Rights
In most systems it is not usually necessary for any
individual user to have access to all data on a
database
­ Passwords will hold details of access modes
· Read-Only
· Read/Write
· No Access
­ Data may only be accessible at certain times
­ This ensures…

Page 8

Preview of page 8
Counteracting Fraud
Fraud, malicious damage, or theft of software or data, may
be due to disgruntled employees. To counteract this:
­ Careful vetting of prospective employees
­ Immediate removal of staff who are sacked or resign ­ cancellation
of their passwords
­ Separation of duties
­ Prevention of unauthorised access…

Page 9

Preview of page 9
Protection against viruses
New software should be in tamper-proof
packages
Disallow use of floppy diskettes to
import/export software
Use anti-virus software to
­ check all floppy disks before use
­ Scan emails before they are accepted
­ Disallow email attachments

Page 10

Preview of page 10
Biometric measures
Biometric methods do not depend upon
passwords. They use biological features to
identify users:
­ Fingerprint recognition
­ Voice recognition
­ Face recognition
­ Infra-red scans to examine pattern of blood
vessels
­ Iris recognition technology

Comments

Mr A Gibson

Report

Number one of three presentations which provide a good overview of this topic area.

Resource 1 - Security of Data - this resource

Resource 2 - Computer Crime

Resource 3 - Protecting ICT Systems

Download these to your mobile device and review on the go!

Similar ICT resources:

See all ICT resources »