Topic 25- Data protection issues

Topic 25- Data protection issues

HideShow resource information

Topic 25- Data protection issues

Data Destruction

  • Data can be destroyed in a number of ways:
  •  Equipment malfunction
  •  Equipment destruction
  •  User error

How to protect data from accidental destruction

  • Train users- so they are less likely to make mistakes
  • Ensure backup copies are kept- as data can be recovered from backups if lost
  • Throughly test software- to avoid system crashes which can lose data

How to protect data from deliberate damage

1 of 4

Topic 25- Data protection issues

  • Use a firewall to prevent hackers- a firewall can be hardware, software or both
  • To protect against disgruntled employees destroying data- ensure that you carefully select staff and they leave, they should no be allowed to work their notice
  • Virus attack- install virus checking software and scan regularly for viruses

What a firewall does

  • Look at the data coming in from the Internet
  • If it is allowable, it lets it through
  • If not, it is rejected by the firewall
  • In this way it stops hackers

Viruses

  • Viruses scanning (checking) software checks system for viruses
  • It should be used regularly
  • Do not open email file attachments unless you know who they are from
2 of 4

Topic 25- Data protection issues

  • Do not load illegal games/software/music as these often contain viruses

Protecting data unauthorised access 1

  • Use username (user IDs) and passwords
  • Use encryption when data is stores or transmitted (e.g. over the interent)
  • User must remember to log off when away from their computer

Protecting data unauthorised access 2

Use physical mehods to prevent access to computers or computer rooms such as:

  • Keypads to gain access to rooms
  • Biometric access to rooms and computers using fingerprints and retinal scanning

Encryption

3 of 4

Topic 25- Data protection issues

  • Scramples data before sending or storing it
  • Used when banking or credit cards details are sent over the internet
  • If data is intercepted or stolen, it cannot be understood
4 of 4

Comments

No comments have yet been made

Similar ICT resources:

See all ICT resources »See all Data and Information resources »