Safety And Security Of Data Student Work


Published on

A presentation prepared by my Y12 ICT AQA AS students in preparing for Unit 2, topic 5

Published in: Education
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Safety And Security Of Data Student Work

  1. 1. Overview Tom, Adam and Charlotte
  2. 2. Malpractice <ul><li>Not backing up work </li></ul><ul><li>Going behind employers back </li></ul><ul><li>Looking at porn </li></ul><ul><li>Using download sites for music and films </li></ul><ul><li>Staying logged on </li></ul><ul><li>Looking at irrelevant websites </li></ul><ul><li>Sharing usernames and passwords with other people </li></ul>
  3. 3. Protecting Against Internal Threats <ul><li>Passwords </li></ul><ul><li>Attach computers to desks </li></ul><ul><li>Staff Training </li></ul><ul><li>Anti-virus software </li></ul><ul><li>Code of conduct </li></ul>
  4. 4. Protecting Against External Threats <ul><li>Firewalls to prevent hacking </li></ul><ul><li>ICT facilities not in flood risk area </li></ul><ul><li>Laptop data encrypted to help prevent loss when stolen </li></ul><ul><li>Uninterruptible power supply </li></ul><ul><li>Use security codes on doors etc to prevent access from unauthorised people </li></ul>
  5. 5. Crime <ul><li>Copying software </li></ul><ul><li>Hacking </li></ul><ul><li>Stealing peoples information </li></ul><ul><li>Fraud </li></ul><ul><li>Stealing disks and programs, even data </li></ul><ul><li>Having illegal/pirate software </li></ul><ul><li>Spreading viruses </li></ul>
  6. 6. External Threats Darryl Arnett, Robert Dean & Steven Pennie
  7. 7. Electronically <ul><li>A database is a potential goldmine to the cyber-criminal or hacker that is determined to profit from the theft of personal or business information. </li></ul><ul><li>Power Failure </li></ul><ul><li>Viruses </li></ul>
  8. 8. Natural Disasters <ul><li>Fire </li></ul><ul><li>Floods and Other Water Damage </li></ul><ul><li>can result in a loss of equipment and data </li></ul>
  9. 9. To Prevent it <ul><li>Use Firewalls </li></ul><ul><li>You don’t have ICT facilities in potential areas prone to flooding </li></ul><ul><li>Use keypads/biometric measures to prevent unauthorised access ICT rooms/equipment </li></ul><ul><li>Encrypt data on laptops so if they are stolen the security of the data is not compromised </li></ul><ul><li>Install an interruptible power supply to prevent loss of power </li></ul>
  10. 10. Internal THREATS!!! By Ben, Ross and Ash
  11. 11. Internal Threats <ul><li>Examples of Internal threats are: </li></ul><ul><li>Employees introducing viruses </li></ul><ul><li>Staff deliberately damaging software, hardware and data </li></ul>Staff accidentally loosing or damaging data. Staff leaving computers logged on. Staff letting other people know their passwords. Staff hacking in to ICT systems.
  12. 12. Protecting Against internal threats! <ul><li>Train staff to prevent mistakes. </li></ul><ul><li>Use passwords to prevent unauthorised access. </li></ul><ul><li>Attach computers to desks to prevent theft </li></ul>Install virus checking software. Change passwords regularly. Have an acceptable use policy.
  13. 13. Malpractice William Featherby, James Foley, Georgina Walls
  14. 14. Definition of Malpractice <ul><li>Malpractice is the word used to describe the act of careless and improper use of ICT. </li></ul><ul><li>At the workplace, the rules are stated in an ICT policy. Malpractice involves breaking these rules without malicious intent. </li></ul><ul><li>Malpractice is not against the law </li></ul>
  15. 15. Examples of Malpractice <ul><li>Downloading material which is not appropriate to your job </li></ul><ul><li>Surfing the internet in work hours. </li></ul><ul><li>Not backing up your work. </li></ul><ul><li>Compromising company security by not logging off from your workstation. </li></ul>
  16. 16. By Joe C & Joe H
  17. 17. Examples of crime include:
  18. 18. Hacking <ul><li>A hacker is a term for a computer criminal which steals your identity or information without permission </li></ul>
  19. 19. Identity Theft <ul><li>Identity theft is a term used to refer to fraud that involves pretending to be someone else in order to steal money </li></ul>
  20. 20. Fraud <ul><li>A fraud is a deception made for personal gain or damage to another individual </li></ul>