data protection and security means to protect your data from unauthorized user access. we should apply some privacy measures to protect our data from unauthorized access. security measures taken to protect the integrity of the data
2. • Chapter 1 More on Number System
• Chapter 2 Working on Word
• Chapter 3 Working with Spreadsheet
• Chapter 4 Problem solving
• Chapter 5 Introduction to programming
• Chapter 6 Programming in GW-BASIC
• Chapter 7 Data verification & validation
• Chapter 8 Data protection & security
• Chapter 9 Applications of computers
• Chapter 11 The future of Technology
• Chapter 12 Creating webpages
12/3/2019
2
5. What is data protection and security?
• Being connected to the internet involves sharing
a lot of information.
• We disclose our address, bank account number,
and credit card number when we shop online.
• All of this information is personal. It should not
be shown to any unconcerned person.
• Both businesses and users suffer because of
poor information security.
• Your personal data might reveal things that you
would not like to disclose to the general public.
6. Continued…
• This information can be stolen from a business’s
database. This data can be used to harass
people, commit fraud and engage in other
criminal activities.
• It is important for the businesses to protect
their customers’ data from being stolen or
misused.
7. Common security issues
• Problem of data security has grown up due to
sharing of information on internet.
• Some of them are internet fraud & viruses.
8. Data Privacy
• Some information are private and we don’t like to
disclose it to people we don’t know personally.
• Such information include our address, telephone
number, password and bank account number.
• Data privacy involves protecting information and
allowing access to relevant people only.
• Businesses need to keep their customer data
secure and keep password secret or asking you a
secret question.
9. Identity theft
• Identity thief gain access to a person’s personal
information without his knowledge.
• Such personal information are password,
credit card number, bank account number etc.
• He can use such information to commit crime.
When the police try to trace the criminal, they
end up arresting the person whose identity
was stolen.
10. Continued…
• Employees who are fired from their jobs might
steal the personal data of customer as a form
of revenge against the company .
• Some thieves might use this information to
purchase items and then charge them to the
original person’s credit card without his
knowledge.
11. Data Integrity
• Three attributes of data integrity are:
1. Complete
2. Accurate
3. Sensible
12. Continued…
• When an unauthorized user gain access to
data and change it, it loses its integrity.
• They might delete some information or add
incorrect information.
• This happens very commonly on websites.
Therefore, it is important to protect
information from any unauthorized changes.
14. Forms of security threats
• Threats to data privacy, identity and integrity
can take several forms.
• We should know about these forms.
• Some of them are:
1. Internet fraud
2. Hacking
3. Phishing
4. Adware & spyware
15. Internet Fraud
• Fraud happens when a person cheats another
for some financial gain. it is quite common in
business.
• Internet fraud take place online and it is very
easy because buyers and sellers cannot see
each other or meet personally.
• Internet fraud can take the form of scams.
16. Continued…
• A scam is committed when a person promises
to give out huge prizes to the people who
provide their personal details on a website or
through email. However, after providing
personal data, they receive nothing.
• The fraudster disappears with all their
personal information and cannot be caught.
• He might then use that information to commit
crimes.
17. Hacking
• Hackers are people who gain access to a
computer without the knowledge of the
original user.
• He can steal the data or can change it.
• Hackers usually target e-commerce websites
and online banking websites.
• A hacker might hack a system to steal money
and information, or just for fun.
18. Phishing
• It is an illegal activity. It happens when someone
pretends to be a reliable organization, such as a
bank, to obtain personal information.
• The phisher creates a website similar to the
website of an actual bank. The phisher then sends
email messages to the customers of the actual
bank asking them to visit the phisher’s website.
• The customers give away their personal
information such as their bank account number.
The phisher can misuse this information.
19. Adware and spyware
• Adware is a type of software that is annoying but
harmless.
• When a user visit a webite , adware display pop-
up advertisements on the computer screen.
• Sometimes adware runs with another type of
software called spyware.
• Spyware monitors the websites the user visit.
• It sends the information to a pre-defined source.
20. Continued…
• That source can then misuse that information
or sell them to the interested parties, such as
owner of the websites.
• The owners use this information to make their
website more interesting because they know
what type of websites different users visit.
21. Sources of security threats
• Some sources of security threats are:
• Computer viruses
• Trojan horse
• Worms
• We can protect our data from such threats I
we know where these threats come from.
22. Common modes of security threats
• We know where threats to data security come
from. We also know how the virus, worm and
Trojan horse enter our system.
• That help us to create barriers that prevent
them from infecting our computers.
• Common modes of security threats are:
1. Infected drives and devices
2. Email attachments
3. Unsecured websites
4. Pirated software
23. Infected drives and devices
• Viruses can infect any kind of device such as
hard disk, CD,USB etc. When we connect this
device to other computer, the computer get
infected too.
• Viruses destroy data stored on the computer or
cause it to malfunction.
• We should avoid using portable storage devices
from unknown sources and should install an
antivirus program.
24. Email attachments
• Some internet users circulate a virus infected
email messages that can cause harm to
computer system and result in loss of data
when the user click on email attachment .
• We can avoid this by only opening email sent
by people we know.
25. Unsecured websites
• Each website offers contents that attracts user.
• These users might also include hackers. They
might hack these websites so that any
personal data that users provide to the
website is redirected to the hackers.
• Website should maintain high security levels
and users should think twice before giving
away personal information to anyone on
internet
26. Pirated software
• Most companies require users to pay a certain
amount of money as licensing fee before installing
and using their software.
• If a user obtain that software from some other
source and start using it without paying, this s
called software piracy.
• Pirated software is a copied software from a local
computer vendor. Most of the time the vendor’s
computer is virus infected and that virus being
transferred to the CD and would be transferred to
our computer.
27. Antivirus Software
• Computer viruses are extremely dangerous for the
computer and the information stored on it.
• Antivirus programs have been designed to prevent
viruses from affecting our data.
• They detect computer viruses and make them
ineffective.
• A virus is a program written in some programming
language. When this program is represented in
machine code, it is called virus definition.
28. Continued…
• Antivirus software contains a store of several
virus definitions.
• To identify a virus that has infected the
computer, it matches its code to virus
definition stored in its database.
• An antivirus can only control a virus if the
virus definition is stored in its database.
29. • New viruses are being created all the time. It
is impossible for a single antivirus to have all
possible virus definition in its database.
• It is important to update an antivirus on
regular basis to add new virus definition in its
database.
Continued…