Published on

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this


  1. 1. Security ICT GCSE
  2. 2. Loss of Data <ul><li>Can have many consequences: </li></ul><ul><ul><li>Cash flow problems </li></ul></ul><ul><ul><li>Failure to receive or make payments </li></ul></ul><ul><ul><li>Late or non-delivery of goods </li></ul></ul><ul><ul><li>Making bad business decisions </li></ul></ul><ul><ul><li>Bad publicity </li></ul></ul><ul><ul><li>Loss of goodwill from customers </li></ul></ul><ul><ul><ul><li>Remember data is often confidential and/or irreplaceable. For these reasons it is essential that business puts sufficient measures in place to protect its data </li></ul></ul></ul>
  3. 3. Threats to data <ul><li>Physical (ie fire) </li></ul><ul><li>Viruses </li></ul><ul><ul><li>Software that automatically copies itself so that it can ‘infect’ other disks or programs </li></ul></ul><ul><li>Data Loss </li></ul><ul><ul><li>For example the computer could develop a problem or data could be lost through user error . Hard disks do not have an infinite life and will eventually fail </li></ul></ul><ul><li>Most of these threats can be combated through regular backups </li></ul>
  4. 4. Data theft <ul><li>Sensitive or confidential data can be stolen in two main ways: </li></ul><ul><ul><li>By employees who already have the appropriate access privileges </li></ul></ul><ul><ul><li>By a hacker </li></ul></ul><ul><ul><ul><li>A hacker is a person who gains access to a computer by breaking codes or passwords without authorisation </li></ul></ul></ul><ul><ul><ul><li>(Computer Misuse Act, 1990) </li></ul></ul></ul><ul><li>Why would someone want to do this? </li></ul>
  5. 5. Ways of securing data <ul><li>Use of effective passwords </li></ul><ul><ul><li>Ensure you use long passwords which contain a combination of letters and numbers </li></ul></ul><ul><li>Encrypting data using codes </li></ul><ul><ul><li>It is impossible to read the data without a decoder . This method can be used when sending sensitive files via e-mail </li></ul></ul><ul><li>Locking your computer when leaving it unattended </li></ul><ul><li>(Data Protection Act, 1998) </li></ul>
  6. 6. Data Quality <ul><li>Data must be checked as it is being entered into a computer system, two methods are used: </li></ul><ul><ul><li>Validation </li></ul></ul><ul><ul><ul><li>Checking carried out by the computer to ensure the data is sensible and will be cause any problems </li></ul></ul></ul><ul><ul><li>Verification </li></ul></ul><ul><ul><ul><li>Checks that data that has been entered, or copied from another medium (ie paper) has been transferred correctly </li></ul></ul></ul><ul><ul><ul><li>These checks are often made manually </li></ul></ul></ul>