By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

34
By Mrs. Smith DATA INTEGRITY AND SECURITY

Transcript of By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

Page 1: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

By Mrs. Smith

DATA INTEGRITY AND SECURITY

Page 2: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

Accurate

Complete

Valid

Data Integrity

Page 3: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

Data integrity refers to the validity of data.Making sure data stored is accurate.Ensuring data stored is not intentionally altered.

Data Integrity

Page 4: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

Inaccurate data entryVirusesHardware malfunctionsAccidental or Malicious

deletion or changing of data

Natural Disasters

How can data integrity be

compromised?

Page 5: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

Data security is ensuring your data is not compromised.

Data security can be classified into two main groups:Physical safeguards Software safeguards

Data Security

Page 6: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

Physical Safeguards

Page 7: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

Only allow authorized

personnel access to computer

facilities.

Page 8: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

Hire Security Guards

Page 9: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

Install monitoring systems using video cameras

Page 10: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

Storing backed up data in a

fireproof safe

Page 11: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

Installing locks on doors

Page 12: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

Software Safeguards

Page 13: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

#1Using Passwords to

access the Computer System

Page 14: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Page 15: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

#2Using passwords for individual files

or folders.

Page 16: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

#3Data Encryption –

Coding/ Scrambling your data

the encoded version of a message

Page 17: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

#4Installing a Firewall

(filters the information coming to your computer from the Internet)

Page 18: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

Viruses

Page 19: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

A malicious program that activates itself unknown to the user and destroys or corrupts data.

What is a virus?

Page 20: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

Downloading infected programs and files from t he internet

Opening infected files received through emails

Using storage devices that contain infected files

How are they usually spread?

Page 21: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

A business can lose millions of dollars due to: data corruption, Lost data and computer down time

Effects of viruses

Page 22: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

Install antivirus software and always keep it up to date with the latest virus definitions

Do not use storage devices from other computers in your computer unless you scan for viruses first

Do not open email attachments that contain .exe, .com or .vbs file extensions

Prevention and protection against

viruses

Page 23: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

The right of individuals to determine what information is being kept about them and how the information will be used.

Data privacy act 1984 – requires that all data being kept about an individual be accurate and used only for the purpose for which it was collected

Data privacy

Page 24: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

It requires that all data being kept about an individual be accurate and used only for the purpose for which it was collected

Data Privacy Act1984 USA

Page 25: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

Ensures that any organization, company or governmental organization storing information on individuals abides by the following rules:Data must not be used for any purpose other than what it

was collected forData must be updated to maintain integrityData must be protected from unauthorized access and use Individuals have the right to check data held about them

Data Protection Act 1998 UK

Page 26: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

This act ensures:TransparencyAccountabilityEquality of AccessEmpowerment and Increased Participation

Freedom of Information Act 1999 TT

Page 27: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

Software piracyHackingInternet Fraud

COMPUTER CRIMES

Page 28: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Page 29: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Page 30: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

The unauthorized copying, use or selling of software that is copyrighted

Software Piracy

Page 31: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

The unauthorized accessing of a computer system: To steal confidential data To copy computer programs illegally To alter data To destroy data (deleting or

implanting virus) To transfer money using Electronic

Funds Transfer (EFT)

Hacking

Page 32: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
Page 33: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

Mainly the bogus selling of products over the internet

Page 34: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.

For a copy of this powerpoint and further reading:

www.yolasite.chss.com