Catholic University College of Ghana FiapreSunyani Data Protection

  • Slides: 17
Download presentation
Catholic University College of Ghana Fiapre-Sunyani Data Protection and Security Computers and law Work

Catholic University College of Ghana Fiapre-Sunyani Data Protection and Security Computers and law Work Ergonomics INFORMATION TECHNOLOGY I Audrey Asante, Faculty of ICST

DATA PROTECTION AND SECURITY • Safe guarding of information. Taking precautions to prevent the

DATA PROTECTION AND SECURITY • Safe guarding of information. Taking precautions to prevent the loss or misuse of information or data. • Access control: unauthorized access to an individual or company’s information. Some of the precautions are – Encryption – Use of password, PIN (personal identification number), digital signatures, physical traits (biometrics), call-back system blocking all who have passwords – Physical access (locking with padlocks), cards, keys, signatures, badges

Protection of software and data • Control of access: online file accessible to only

Protection of software and data • Control of access: online file accessible to only legitimate users • Audit controls: tracking of programs and servers in use • People control: screening of job applicants (resumes). Also, separate of employee functions. Manual and automated controls-input controls, processing controls and output controls-are used to check that data is handled accurately and completely during the processing cycle. Printouts can be discarded or disposed by shredding or in locked trash barrels.

Disaster-recovery plans • Is a method of restoring information processing operations that have been

Disaster-recovery plans • Is a method of restoring information processing operations that have been halted by destruction or accident. • Host site is a fully equipped computer center, with everything needed to resume functions. • A cold site is a building or other suitable environment in which a company can install its won computer system

Measures to Data Loss • Master files: updating a file periodically. It is also

Measures to Data Loss • Master files: updating a file periodically. It is also advisable to store three most recent updates. • Direct-Access files: Backing up of files and any update should affect the back up. • Fire proof safes used to store files • Write protection mechanism on disks or tapes especially the diskette

SECURITY ISSUES • Threats to computers and communication systems – Errors and Accidents –

SECURITY ISSUES • Threats to computers and communication systems – Errors and Accidents – Natural and other hazards – Crime against computers and communications – Crime using computers and communications – Worms and viruses – Computer criminals

Errors and Accidents • Human errors: people can complicate the workings of a system

Errors and Accidents • Human errors: people can complicate the workings of a system in three ways – Humans often are not good at assessing their own information. Thus, for example, many users will acquire a computer ad communications system that either is not sophisticated enough or is far more complex than they need. – Human emotions affect performance – Humans act on their perception, which in modern information environments are often too slow to keep up with the equipment. You can be overwhelmed by information overload, for example, that decision making may be just as faulty as if you had too little

 • Procedural errors • Software errors (software bugs) • Electromechanical problems: mechanical systems

• Procedural errors • Software errors (software bugs) • Electromechanical problems: mechanical systems such as printers and electrical systems, such as circuit boards, don’t always work. They may be improperly constructed, get dirty or overheated, wear out, or become damaged in some other way. Power failures can shut a system down. Power surges can burn out equipment. In the digital age, normal accidents will not be rarities but are to be expected.

 • Dirty data problems: dirty data is data that is incomplete, outdated, or

• Dirty data problems: dirty data is data that is incomplete, outdated, or otherwise inaccurate. You should have a look at your records so you can make any corrections to them before they cause you complications.

NATURAL AND OTHER HAZARDS • Natural hazards: fire, floods, earthquakes • Civil strife and

NATURAL AND OTHER HAZARDS • Natural hazards: fire, floods, earthquakes • Civil strife and terrorism

Crime against computers and communications • Two ways, illegal act perpetrated against computers and

Crime against computers and communications • Two ways, illegal act perpetrated against computers and communications or the use of computers or telecommunications to accomplish an illegal act. • Crimes against IT include theft-hardware, software, time and services, information, crime of malice and destruction

COMPUTER CRIMINALS • • Employees Outside users Hackers and crackers Professional criminals

COMPUTER CRIMINALS • • Employees Outside users Hackers and crackers Professional criminals

Computer Virus • A piece of software that replicate and transfer itself from one

Computer Virus • A piece of software that replicate and transfer itself from one computer to another, without the user being aware of. Some are harmless, others destroy or damage data. • A worm is a program that copies itself repeatedly into memory or onto a disk drive until no space is left. More malicious than a virus

Mode of Transmission • By secondary storage device • By network

Mode of Transmission • By secondary storage device • By network

TYPES OF VIRUSES • Boot-Sector Virus: Affect the boot sector files and rather loads

TYPES OF VIRUSES • Boot-Sector Virus: Affect the boot sector files and rather loads itself before the operating system. Example: Anti. EXE, Ripper, Monkey. • File Virus: Attaches itself to executable files. When the program is run, the virus starts working, trying to get into the main memory and infecting other files

Types of Viruses • Logic Bombs: they differ from other viruses, they are set

Types of Viruses • Logic Bombs: they differ from other viruses, they are set to go off a certain date and time. Maybe to erase an inventory system at a given time and date. • Trojan Horse: covertly places illegal, instructive instructions in the middle of a legitimate program. Example is Format. C.

READ • Computers and law • Work Ergonomics

READ • Computers and law • Work Ergonomics