SecurityProcedures
TenCommandments of Computer     ethics
10 Commandments of computer ethics1. Thou shall not use a computer   to harm other people2. Thou shall not interfere with ...
10 Commandments of   computer ethics6. Thou shall not copy or use proprietary     software for which you have not paid.7. ...
The information used  by an organizationusually originates in one    of three ways. It        includes;
1. Produced from data   collected by the   organization.2. Produced from data   collected by an outside   source.3. Purcha...
SecurityProcedure
Stages of       Procedures to secure                   Procedures to secure information    against accidental damage.     ...
Protecting    theintegrity of    data
Protecting the integrity of data    Methods of              Methods of         Method of securing the   protecting the    ...
Security forinformation  received
Security forinformation received1. When ENTERING2. While OPEN in their system3. When EXITING
Security forinformation produced.
Security forinformation produced.•Regular Back-ups•File Access Restriction
Regular Back-Ups In organizations where staff  are using computers at the desktop for a range of tasks  during the day, au...
Additional Back-upprocedures includes;1. screen messages instructing   operators to back-up work on   a floppy disk when a...
Additional Back-upprocedures includes;3. saving and printing controlledcopies of files required forproofing or by a refere...
File AccessRestrictions
File AccessRestrictions  Passwords are playing    important role incontrolling the security ofinformation produced by     ...
File Access  RestrictionsFeatures include:• structure of hierarchy• allocation• duration
BOSS     Staff                Financial            Stock    Manager               Manager             Manager           St...
Security for      information     communicatedInformation produced electronically byan organization can be communicated vi...
Procedures toprotect informationcommunicated by an   organization• newspapers need classifiedadvertisements with correctph...
Thank You!
Upcoming SlideShare
Loading in …5
×

Bettyboop

321 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
321
On SlideShare
0
From Embeds
0
Number of Embeds
7
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Bettyboop

  1. 1. SecurityProcedures
  2. 2. TenCommandments of Computer ethics
  3. 3. 10 Commandments of computer ethics1. Thou shall not use a computer to harm other people2. Thou shall not interfere with other peoples computer work.3. Thou shall not snoop around in other peoples computer files.4. Thou shall not use a computer to steal.5. Thou shall not use a computer to bear false witness.
  4. 4. 10 Commandments of computer ethics6. Thou shall not copy or use proprietary software for which you have not paid.7. Thou shall not use other peoples computer resources without authorization or proper compensation.8. Thou shall not appropriate other peoples intellectual output.9. Thou shall think about the social consequences of the program you are writing or the system you are designing.10. Thou shall always use a computer in ways that ensure consideration and respect for your fellow humans.
  5. 5. The information used by an organizationusually originates in one of three ways. It includes;
  6. 6. 1. Produced from data collected by the organization.2. Produced from data collected by an outside source.3. Purchased in a pre- processed format from an outside source.
  7. 7. SecurityProcedure
  8. 8. Stages of Procedures to secure Procedures to secure information against accidental damage. against deliberate Processing. intrusion. •Electronic validation. •Password access to equipmentData Entry •On-screen reminders of security and files. procedures. •Knowledge and verification of source data. •Program testing. •Program testingProcessing •Matching to template. •Matching run times; if a •Check digit in the binary code, program takes longer than known as a ‘parity bit’. expected it may have been caused by an intrusion. •Random proofreading, as in •Logging of every outputInformation newspaper attempt Output •On-screen reminders about saving •Password access to output files devices. •Read only files where appropriateCommunication •Clear, dated source identity •Encryption of information •Verification of destination identify •Logging destination addresses before transmission. •Logging the terminal address used to communicate the info.
  9. 9. Protecting theintegrity of data
  10. 10. Protecting the integrity of data Methods of Methods of Method of securing the protecting the guaranteeing the information products integrity of data software processesPassword access Regular file matching Password access toto terminal that guard against editing functions. hacker entry to a system.ID location badge Virus detection Read-only files wherefor staff using programs that run at possiblecash register critical events in the program.Biometric identify Encryption downloadsuch as fingerprint with scan.and iris scan
  11. 11. Security forinformation received
  12. 12. Security forinformation received1. When ENTERING2. While OPEN in their system3. When EXITING
  13. 13. Security forinformation produced.
  14. 14. Security forinformation produced.•Regular Back-ups•File Access Restriction
  15. 15. Regular Back-Ups In organizations where staff are using computers at the desktop for a range of tasks during the day, autosave is only one part of back-up procedures used to secure information.
  16. 16. Additional Back-upprocedures includes;1. screen messages instructing operators to back-up work on a floppy disk when a tasks is completed.2. automatic log-out and save after 10 minutes of inactivity.
  17. 17. Additional Back-upprocedures includes;3. saving and printing controlledcopies of files required forproofing or by a reference group.4. saving all files and folders onthe network to a tape, disk,cartridge, etc. which is thendated and locked in a securefireproof cupboard.
  18. 18. File AccessRestrictions
  19. 19. File AccessRestrictions Passwords are playing important role incontrolling the security ofinformation produced by organization.
  20. 20. File Access RestrictionsFeatures include:• structure of hierarchy• allocation• duration
  21. 21. BOSS Staff Financial Stock Manager Manager Manager StaffRosters Accounts Payroll Orders Advertising Records
  22. 22. Security for information communicatedInformation produced electronically byan organization can be communicated viarange of media that includes; Cable Disk/CD-ROM Internet/e-mail Graphics microwave
  23. 23. Procedures toprotect informationcommunicated by an organization• newspapers need classifiedadvertisements with correctphone and price details.• libraries need an up-to-date listof all titles available to borrowers.
  24. 24. Thank You!

×