Computer Security

Published on January 2017 | Categories: Documents | Downloads: 38 | Comments: 0 | Views: 287
of 1
Download PDF   Embed   Report

Comments

Content

Computer security
• Computer security is concerned with the protection of software, hardware, and – most importantly – data. • Data costs lots of time and money to collect and process, and its loss can cause serious problems, especially for businesses. •



The consequences of data loss
• • • • • Loss of customer goodwill. Late delivery of goods. Bad decision making. Adverse publicity. Cash flow problems.

Types of computer security
• Physical security including: o Prevention from theft. o Protection from fire. o Protection from environmental hazards. • Software security including: o Protection from viruses. o Backing up data. o Protecting files. o Encryption.



• • • •

Physical security
• Prevention from theft can include: o Making sure the building is secure (e.g. burglar alarms, the use of security locks, staff must wear security badges). o Keeping a log of hardware serial numbers. o Having removable hard drives that can be locked in a safe when not in use. o Keeping back ups and copies of files in secure off-site locations. • Protection from fire can include: o Smoke detectors in computer rooms. o Inert gas flooding anti-fire systems for computer rooms. o Fireproof doors on computer rooms. • Protection from environmental hazards can include: o Air conditioning that keeps computer rooms at the optimum temperature. o Air filters that keep dust out of computer rooms. o Humidity controls that keep the level of water in the atmosphere at the optimum level.

Not allowing the installation of software by unauthorised users. Backing up data needs to be done on a regular basis, and the back up copies kept in a secure location away from the computer network (i.e. not just as a separate file on the computer network). Back ups need to be made because files are sometimes lost due to: o Human error - it is very common for users to delete files by mistake. o Hardware failure – a computer hard drive is likely to fail (i.e. stop working properly) on average once every 27 months Files can be protected in a variety of ways including: o The use of passwords for user access to the computer network and on individual user areas and/or files. o Restricting user access to only those areas of the computer network they need to access. o Write protecting files that are kept on floppy disk. Encrypting (encoding) data stops unauthorised people being able to read the data. Only users who have the key to the code can decode the data. Encryption is particularly useful when data is being sent over a WAN system (e.g. the Internet) Encryption is used by online businesses to protect a customer’s confidential financial data (e.g. credit card details) from being accessed by someone who could use that data fraudulently. o 1. 2. 3. 4. 5. 6. What is computer security and why is it important? What three methods of physical computer security may be needed and how can they be achieved? How can infection of a computer system by computer viruses be prevented? Why is the backing up of data so important and how can it be achieved? What methods can be used to protect files? What is encryption and why is it used?

Tasks:

Extension Task:
Internet fraud is a major problem. What should you do if you get a message from an online bank asking you to confirm your details? Should you send your details (i.e. bank account number and password) or should you notify the bank about the message?

Software security
• Protection from viruses can be ensured by: o The use of up-to-date antivirus software on the computer network. o The use of new (not second hand or copied) software. o Regular antivirus ‘sweeps’ of the network.

16 - Security and backups

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close