SlideShare a Scribd company logo
Security
Procedures
Ten
Commandments
 of Computer
     ethics
10 Commandments of
 computer ethics


1. Thou shall not use a computer
   to harm other people
2. Thou shall not interfere with
   other people's computer work.
3. Thou shall not snoop around in
   other people's computer files.
4. Thou shall not use a computer
   to steal.
5. Thou shall not use a computer
   to bear false witness.
10 Commandments of
   computer ethics

6. Thou shall not copy or use proprietary
     software for which you have not paid.
7. Thou shall not use other people's
     computer resources without
     authorization or proper compensation.
8. Thou shall not appropriate other people's
     intellectual output.
9. Thou shall think about the social
     consequences of the program you are
     writing or the system you are designing.
10. Thou shall always use a computer in ways
     that ensure consideration and respect
     for your fellow humans.
The information used
  by an organization
usually originates in one
    of three ways. It
        includes;
1. Produced from data
   collected by the
   organization.
2. Produced from data
   collected by an outside
   source.
3. Purchased in a pre-
   processed format from
   an outside source.
Security
Procedure
Stages of       Procedures to secure                   Procedures to secure
 information    against accidental damage.                 against deliberate
  Processing.                                                  intrusion.
                •Electronic validation.                 •Password access to equipment
Data Entry      •On-screen reminders of security        and files.
                procedures.                             •Knowledge and verification of
                                                        source data.

                •Program testing.                       •Program testing
Processing      •Matching to template.                  •Matching run times; if a
                •Check digit in the binary code,        program takes longer than
                known as a ‘parity bit’.                expected it may have been
                                                        caused by an intrusion.
                •Random proofreading, as in             •Logging of every output
Information     newspaper                               attempt
   Output       •On-screen reminders about saving       •Password access to output
                files                                   devices.
                •Read only files where appropriate
Communication   •Clear, dated source identity           •Encryption of information
                •Verification of destination identify   •Logging destination addresses
                before transmission.                    •Logging the terminal address
                                                        used to communicate the info.
Protecting
    the
integrity of
    data
Protecting the integrity of data
    Methods of              Methods of         Method of securing the
   protecting the        guaranteeing the       information products
  integrity of data
                        software processes

Password access       Regular file matching    Password access to
to terminal           that guard against       editing functions.
                      hacker entry to a
                      system.
ID location badge     Virus detection          Read-only files where
for staff using       programs that run at     possible
cash register         critical events in the
                      program.
Biometric identify                             Encryption download
such as fingerprint                            with scan.
and iris scan
Security for
information
  received
Security for
information received
1. When ENTERING

2. While OPEN in their system

3. When EXITING
Security for
information
 produced.
Security for
information
 produced.
•Regular Back-ups
•File Access Restriction
Regular Back-Ups


 In organizations where staff
  are using computers at the
 desktop for a range of tasks
  during the day, autosave is
   only one part of back-up
  procedures used to secure
         information.
Additional Back-up
procedures includes;

1. screen messages instructing
   operators to back-up work on
   a floppy disk when a tasks is
   completed.

2. automatic log-out and save
   after 10 minutes of inactivity.
Additional Back-up
procedures includes;

3. saving and printing controlled
copies of files required for
proofing or by a reference group.

4. saving all files and folders on
the network to a tape, disk,
cartridge, etc. which is then
dated and locked in a secure
fireproof cupboard.
File Access
Restrictions
File Access
Restrictions

  Passwords are playing
    important role in
controlling the security of
information produced by
      organization.
File Access
  Restrictions

Features include:

• structure of hierarchy
• allocation
• duration
BOSS

     Staff                Financial            Stock
    Manager               Manager             Manager


           Staff
Rosters             Accounts     Payroll   Orders   Advertising
          Records
Security for
      information
     communicated
Information produced electronically by
an organization can be communicated via
range of media that includes;

               Cable
           Disk/CD-ROM
          Internet/e-mail
              Graphics
             microwave
Procedures to
protect information
communicated by an
   organization
• newspapers need classified
advertisements with correct
phone and price details.

• libraries need an up-to-date list
of all titles available to borrowers.
Thank You!

More Related Content

What's hot

What's hot (20)

Firewall DMZ Zone
Firewall DMZ ZoneFirewall DMZ Zone
Firewall DMZ Zone
 
Protection in general purpose operating system
Protection in general purpose operating systemProtection in general purpose operating system
Protection in general purpose operating system
 
Firewall protection
Firewall protectionFirewall protection
Firewall protection
 
One Person Company
One Person CompanyOne Person Company
One Person Company
 
Types of firewall
Types of firewallTypes of firewall
Types of firewall
 
LAN Security
LAN Security LAN Security
LAN Security
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
Seminar (network security)
Seminar (network security)Seminar (network security)
Seminar (network security)
 
Full resolution image compression with recurrent neural networks
Full resolution image compression with  recurrent neural networksFull resolution image compression with  recurrent neural networks
Full resolution image compression with recurrent neural networks
 
Cyber Security Best Practices
Cyber Security Best PracticesCyber Security Best Practices
Cyber Security Best Practices
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit process
 
Snort ppt
Snort pptSnort ppt
Snort ppt
 
Software theft
Software theftSoftware theft
Software theft
 
Basics of Network Security
Basics of Network SecurityBasics of Network Security
Basics of Network Security
 
Lecture 6
Lecture 6Lecture 6
Lecture 6
 
HARDENING OF WINDOWS 10 OS.pptx
HARDENING OF WINDOWS 10 OS.pptxHARDENING OF WINDOWS 10 OS.pptx
HARDENING OF WINDOWS 10 OS.pptx
 
Introduction to Snort
Introduction to SnortIntroduction to Snort
Introduction to Snort
 
Access control matrix
Access control matrixAccess control matrix
Access control matrix
 
Chapter 10: Information Systems Acquisition, Development, and Maintenance
			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance			Chapter 10:  Information  Systems Acquisition, Development, and Maintenance
Chapter 10: Information Systems Acquisition, Development, and Maintenance
 

Viewers also liked (8)

Security Procedures
Security ProceduresSecurity Procedures
Security Procedures
 
Rrc security procedure overview
Rrc security procedure overviewRrc security procedure overview
Rrc security procedure overview
 
IT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsIT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and Tools
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
 
Requirements and Security Assessment Procedure for C7 To Be PCI DSS Compliant
Requirements and Security Assessment Procedure for C7 To Be PCI DSS CompliantRequirements and Security Assessment Procedure for C7 To Be PCI DSS Compliant
Requirements and Security Assessment Procedure for C7 To Be PCI DSS Compliant
 
Chapter 4 health, safety and security procedures
Chapter 4 health, safety and security proceduresChapter 4 health, safety and security procedures
Chapter 4 health, safety and security procedures
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 

Similar to Security Procedures

2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
mrmwood
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
 

Similar to Security Procedures (20)

Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & Control
 
Security Requirements in eBusiness
Security Requirements in eBusinessSecurity Requirements in eBusiness
Security Requirements in eBusiness
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open SourceInvited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Source
 
css ppt.ppt
css ppt.pptcss ppt.ppt
css ppt.ppt
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
Tietoturvallisuuden_kevatseminaari_2013_Jarno_Niemela
Tietoturvallisuuden_kevatseminaari_2013_Jarno_NiemelaTietoturvallisuuden_kevatseminaari_2013_Jarno_Niemela
Tietoturvallisuuden_kevatseminaari_2013_Jarno_Niemela
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
ICT Security.pdf
ICT Security.pdfICT Security.pdf
ICT Security.pdf
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Presentation cyber forensics & ethical hacking
Presentation   cyber forensics & ethical hackingPresentation   cyber forensics & ethical hacking
Presentation cyber forensics & ethical hacking
 
Pci Req
Pci ReqPci Req
Pci Req
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
 
Six steps for securing offshore development
Six steps for securing offshore developmentSix steps for securing offshore development
Six steps for securing offshore development
 
One of 2 protect your business
One of 2 protect your businessOne of 2 protect your business
One of 2 protect your business
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Cyber security
Cyber securityCyber security
Cyber security
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 

More from markilyn

Degrees of data abstraction copy
Degrees of data abstraction   copyDegrees of data abstraction   copy
Degrees of data abstraction copy
markilyn
 
Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.
markilyn
 
Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.
markilyn
 
Database design challenges conflicting goals
Database design challenges conflicting goalsDatabase design challenges conflicting goals
Database design challenges conflicting goals
markilyn
 

More from markilyn (8)

Email (3)
Email (3)Email (3)
Email (3)
 
Dmbbb
DmbbbDmbbb
Dmbbb
 
Degrees of data abstraction copy
Degrees of data abstraction   copyDegrees of data abstraction   copy
Degrees of data abstraction copy
 
Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.
 
Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.
 
Database design challenges conflicting goals
Database design challenges conflicting goalsDatabase design challenges conflicting goals
Database design challenges conflicting goals
 
Blogging report
Blogging reportBlogging report
Blogging report
 
Bibliographies
Bibliographies Bibliographies
Bibliographies
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024IoT Analytics Company Presentation May 2024
IoT Analytics Company Presentation May 2024
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 

Security Procedures

  • 3. 10 Commandments of computer ethics 1. Thou shall not use a computer to harm other people 2. Thou shall not interfere with other people's computer work. 3. Thou shall not snoop around in other people's computer files. 4. Thou shall not use a computer to steal. 5. Thou shall not use a computer to bear false witness.
  • 4. 10 Commandments of computer ethics 6. Thou shall not copy or use proprietary software for which you have not paid. 7. Thou shall not use other people's computer resources without authorization or proper compensation. 8. Thou shall not appropriate other people's intellectual output. 9. Thou shall think about the social consequences of the program you are writing or the system you are designing. 10. Thou shall always use a computer in ways that ensure consideration and respect for your fellow humans.
  • 5. The information used by an organization usually originates in one of three ways. It includes;
  • 6. 1. Produced from data collected by the organization. 2. Produced from data collected by an outside source. 3. Purchased in a pre- processed format from an outside source.
  • 8. Stages of Procedures to secure Procedures to secure information against accidental damage. against deliberate Processing. intrusion. •Electronic validation. •Password access to equipment Data Entry •On-screen reminders of security and files. procedures. •Knowledge and verification of source data. •Program testing. •Program testing Processing •Matching to template. •Matching run times; if a •Check digit in the binary code, program takes longer than known as a ‘parity bit’. expected it may have been caused by an intrusion. •Random proofreading, as in •Logging of every output Information newspaper attempt Output •On-screen reminders about saving •Password access to output files devices. •Read only files where appropriate Communication •Clear, dated source identity •Encryption of information •Verification of destination identify •Logging destination addresses before transmission. •Logging the terminal address used to communicate the info.
  • 9. Protecting the integrity of data
  • 10. Protecting the integrity of data Methods of Methods of Method of securing the protecting the guaranteeing the information products integrity of data software processes Password access Regular file matching Password access to to terminal that guard against editing functions. hacker entry to a system. ID location badge Virus detection Read-only files where for staff using programs that run at possible cash register critical events in the program. Biometric identify Encryption download such as fingerprint with scan. and iris scan
  • 12. Security for information received 1. When ENTERING 2. While OPEN in their system 3. When EXITING
  • 14. Security for information produced. •Regular Back-ups •File Access Restriction
  • 15. Regular Back-Ups In organizations where staff are using computers at the desktop for a range of tasks during the day, autosave is only one part of back-up procedures used to secure information.
  • 16. Additional Back-up procedures includes; 1. screen messages instructing operators to back-up work on a floppy disk when a tasks is completed. 2. automatic log-out and save after 10 minutes of inactivity.
  • 17. Additional Back-up procedures includes; 3. saving and printing controlled copies of files required for proofing or by a reference group. 4. saving all files and folders on the network to a tape, disk, cartridge, etc. which is then dated and locked in a secure fireproof cupboard.
  • 19. File Access Restrictions Passwords are playing important role in controlling the security of information produced by organization.
  • 20. File Access Restrictions Features include: • structure of hierarchy • allocation • duration
  • 21. BOSS Staff Financial Stock Manager Manager Manager Staff Rosters Accounts Payroll Orders Advertising Records
  • 22. Security for information communicated Information produced electronically by an organization can be communicated via range of media that includes; Cable Disk/CD-ROM Internet/e-mail Graphics microwave
  • 23. Procedures to protect information communicated by an organization • newspapers need classified advertisements with correct phone and price details. • libraries need an up-to-date list of all titles available to borrowers.