Methods of keeping data secure |
|
Firewalls | A firewall is installed on a network to only allow known computers to have access. This is usally a program, but sometimes a hardware device that filters the data coming through the internet connecion. Anyone outside the network wont be able to access the network. |
Authentication Techniques | These are used to check that a person accessing a network or system is genuinely the person in question Techniques used:
|
A username is a series of characters that is used to identify a certain user to a network. A username must be unique, meaning that no two users have the same username. The person who looks after the internet will use this to allocate space on the network for the user. It is also used by the network manager ca also keeep track of what files the user is using for security reasons.
A password is a string of characters that the user selects. Only the user should knw the password. When the user select the passsword it will not be shown on the screen. Only on a correct entry of the password will the user gain acces to the network. Agood password will:
A password is a string of characters that the user selects. Only the user should knw the password. When the user select the passsword it will not be shown on the screen. Only on a correct entry of the password will the user gain acces to the network. Agood password will:
- Do not use a word that can be found in a dictionary
- Do not use your name or any other nae or surname eeven with numbers
- Include numerals
- Include upper and lower case
- Do not write your password down
- change your password regualrly
- do not telll anyone you password
- Never respond to a email that asks for your password
- change password regular
- Anti spyware software can be installed on a network to help protect computers against pop ups, slow performances and security threats caused by spy ware and other unwanted software
- Spyware is a software that can collect and relay personal data without your knowledge. E.g a key logger can record all key strokes made on your computer
Biometric and digital Signitures
1. The biometric system works by recording and comparing biometric characters. They use features of the human body. They are usually a fingerprint or iris (eye). Instead of logging in the user can place their finger on the scanner and be granted access.
2. Three examples of biometrics are-
• Finger print
• Retina print
• Facial recognition
• Vein scanners
3. Two advantages of biometrics are-
• You do not have to remember passwords or usernames.
• The system is hard to abuse or cheat unlike swipe card systems that could be accessed by another.
4. Two disadvantages of biometrics are-
• The hardware and software required are expensive.
• Some people worry about the privacy of the data stored- especially fingerprint details.
5. A digital signature is an ordinary signature that can be used to check the authenticity of a document. When conducting business over the internet you can use a digital signature to be sure that emails and electronic documents are authentic.
6. Digital signatures are used to check the authenticity of documents and emails to check if they really are from the person in question.
2. Three examples of biometrics are-
• Finger print
• Retina print
• Facial recognition
• Vein scanners
3. Two advantages of biometrics are-
• You do not have to remember passwords or usernames.
• The system is hard to abuse or cheat unlike swipe card systems that could be accessed by another.
4. Two disadvantages of biometrics are-
• The hardware and software required are expensive.
• Some people worry about the privacy of the data stored- especially fingerprint details.
5. A digital signature is an ordinary signature that can be used to check the authenticity of a document. When conducting business over the internet you can use a digital signature to be sure that emails and electronic documents are authentic.
6. Digital signatures are used to check the authenticity of documents and emails to check if they really are from the person in question.
Viruses
- A piece of programming code/software which copies itself from one computer to another
- It does this by attaching itself to the files and is transfered via email, programs/files/images downloaded grom the Internet or portable media- USBs ect.
- It can:
- Corrrupt and/or delete files and data
- Corrupt and/or delete the contents of a hard disk
- Make Software unusable
Prevention
- Install anti-virus software to detect viruses and limit their damage by removing them
- The software tries to detect iruses before they can get access to your computer
- Regular update antivirus software
- Only use storage media from known sources
- Only accept software/downloads software from known and trusted websites
- Only visit trusted websites
- Only open attachments from people you know
Encryption
This used to stop data getting into the wrong hands as it travels over the internet
Encryption works by scrambling data as it is transfered from one place to another
This results in data which is not readable
It require an encryption key/software to encrypt and description key to decrypt and read it.
Why?
Encryption works by scrambling data as it is transfered from one place to another
This results in data which is not readable
It require an encryption key/software to encrypt and description key to decrypt and read it.
Why?
- Sending credit card details such as card numbers, expiry dats ect over the internet
- Online Bankinng
- Sending payment details
- Confidential emails
- Sending data between computers on a network where confidentiaity is essntial
- Strong sensitive personal information on laptops and portable devices and media
Why?
Hacking:
Protection against hackers accessing your personal data:
Drawbacks:
- gaining unauthorised access to a computer system
- gaining authorised access to a system but accessing areas without the permission
- may lead to illegal coping/deleting/changing data from a system
Protection against hackers accessing your personal data:
- a hacker could simply intercept and read your email
- a hacker could alter or collect personal data including credit card numbers which could be used to commit fraud
Drawbacks:
- Data can still be deleted form the system
- criminals can use the encryption to keep incriminating material secure
The data protection act
- The Data Protection Act (DPA) is a law passed by the British government in 1984 and updated in 1998.
- It sets out rules for people who use or store data about living people and gives rights to those people whose data has been collected. The law applies to data held on computers or any sort of storage system, even paper records.
- The law covers personal data which are facts like your address, telephone number, e-mail address, job history etc.