Professional Documents
Culture Documents
in
lost or damaged during a system crash - especially one affecting the hard disk
corrupted as a result of faulty disks, disk drives, or power failures
lost by accidentally deleting or overwriting files
lost or become corrupted by computer viruses
hacked into by unauthorized users and deleted or altered
destroyed by natural disasters, acts of terrorism, or war
deleted or altered by employees wishing to make money or take revenge on their
employer
us
sa
ht
a
Accidental Damage
us
M
-M
Data Theft
Hacking
Computer Viruses
If the stored data relates to identifiable individuals then a company must keep data
secure to comply with the Data Protection Act.
Some of the more common measures used to ensure data security are described
below.
us
ht
a
us
sa
in
Physical protection
As you have seen, there are many different ways that you or a business can lose
valuable data. With a little bit of planning and thought however, the risks can be
reduced or even eliminated.
There are many things you can do to make your equipment more secure:
- Lock the room when not in use
- Use swipe cards or keypads to activate locks
- Bolt computers to the desk
- Use special pens to mark your postcode onto the computer case
- Keep windows shut - especially if on the ground floor. Use bars.
- CCTV video cameras
- In large firms, security guards
M
-M
Note: in an exam, you would generally only give one example from the list above and then go on
to discuss the other methods Unless specifically asked to discuss physical security, don't just list
the points from this section.
Safe Storage of Data
Important data should be stored safely. Good quality disks or tapes should be used.
These should be kept in a dust-free environment that is not too hot and is nowhere
near any magnetic fields. Often important data is kept in fireproof, waterproof
safes.
Limiting Physical Access to Computers
Access to a computer system can be limited by keeping the system in a locked
room. Unauthorised people should not be able to access the computers. This would
not however stop an employee who had the authority to access the computer room
from causing deliberate or accidental damage or stealing important data.
A further limitation of this solution is that it is not always possible to limit access to
a computer system physically. Some systems, such as the Automatic Teller
Machines (ATMs) used by banks to dispense money have to be available for the
public to use. Also, many computers are connected to networks and can be
accessed from other computers on the network.
fingerprints
voice patterns
retinas or irises
facial patterns
palm prints
sa
in
us
ht
a
us
M
-M
Software protection
Firewall
A firewall is a program or hardware device that filters the information coming
through the Internet connection into your personal computer or into a company's
network.
It is set up to allow mainly one way access, i.e. you can go out onto the Internet
and access pages, but it checks everything coming back against a set of rules. If
the data coming back is from an unauthorised source, then it is blocked.
You may have heard people saying, 'I can't get on that site at school because it's
been blocked'; that is the firewall in action.
User Name and Password Security Systems
us
ht
a
us
sa
in
If a password system is in use then before you can access a computer system you
must enter a valid user name and password. The process of entering this
information and being granted (or refused) access to a computer is known
as logging on.
Passwords can be guessed or "cracked" and so the success of these systems
depends upon users choosing passwords wisely and keeping them secret. Following
a simple set of guidelines like these will help make a passworded system more
secure:
Change your password regularly.
Make your password at least eight characters long.
Do not write down your password or tell it to anyone else.
Do not use proper words of phrases - these can be found using a dictionary
cracker.
Use a mixture of upper and lower case letters and numbers.
M
-M
Time
Action
Zain
ali
in
us
sa
If users know that their actions are being monitored then they are less likely to
deliberately damage or steal data. Logs can also be used to help trace any
accidental damage to data.A log cannot stop a person from damaging or stealing
data but it can help identify the culprits. Most hackers will try to turn off any log
keeping software when they break into a computer.
us
ht
a
Encryption
Encryption is the process of putting a file or document into a coded form. If a file
has been encrypted then unless you know what the code used to encrypt the file is
you will not be able to use its contents. Even if someone manages to steal an
important file, if it has been encrypted, he is unlikely to be able to make use of it.
M
-M
Backups
Whatever measures are implemented to try and avoid data being deleted or
changed, it is impossible to guarantee that this will not happen. Therefore it is vital
that extra copies are made of important data. For important data a regular backup
procedure should be implemented.
Backups should be kept away from the computer room so that they will not be
damaged by fires / floods etc. There is no point in keeping a backup if it is likely to
get damaged when the original data gets damaged.
The type of backups that are kept usually depend on the type of processing being
carried out:
Virus Checking
Viruses can get onto a computer from infected floppy disks, over a network or over
the Internet. Virus checking software can be installed on a computer to examine all
the files that are accessed, checking them for viruses. If a virus is found the virus
checker will attempt to remove it. The virus checker may not however be able to
recover any data that has already been damaged by the virus.
Disaster Recovery Plans
No matter how secure you attempt to make computer systems and data things will
always go wrong. Any sensible computer department will have a disaster recovery
plan. This will detail the procedures that should be followed to minimise any further
damage once a disaster has occurred. It will also include the procedure which will
be used to attempt to repair or restore as much of the system as is possible.
us
sa
in
SSL
SSL stands for 'Secure Socket Layer'. It is a web browser security technology.
SSL is built into a web browser. SSL allows confidential data to safely pass from
your web browser to a distant server via the Internet. The confidential data is
'encrypted' or scrambled so that only the server can read it.
us
ht
a
For example, e-commerce shops use SSL to keep your credit card details secret.
You can tell when SSL is being used as a small padlock appears on the bottom right
of the browser window. If you click on the padlock, a 'certificate' window appears
that confirms you are connected to the real server and not a fake one.
M
-M
Question
In a local doctor's surgery, data about the patients is stored in a database on
a computer.
Consider two physical precautions that should be taken to keep the data
secure.
Answer
1. keep the computer area secure
2. keep backups in a safe place
Examiner's comment
The key word is physical - the question is asking for the physical precautions you can take to protect
data. Keeping the computer area secure and keeping backups in a safe place are both physical
in
precautions. Swipe card entry, locking terminals or controlling access to computer areas would also have
sa
us
Question
The doctor needs to see all the information about patients. The receptionist
only needs to see some of the information.
ht
a
us
Answer
M
-M
The question is looking for detail about different types of access for different users. This answer clearly
highlights the need for having passwords for different levels of access.