Introducing 

Prezi AI.

Your new presentation assistant.

Refine, enhance, and tailor your content, source relevant images, and edit visuals quicker than ever before.

Loading content…
Loading…
Transcript

Features

  • Content filtering, where some traffic is allowed and some is not.
  • Controlling which programs can access the local area network/internet.
  • Intruder detection and prevention to identify and stop hackers.

Stored Data

Firewalls

Usually encrypted using symmetric encryption.

This secures your data should someone gain access to your device.

There are some implications:

- If you lost the key you lost the data.

- Sharing the key compromises the

encryption.

Implications

Data During Transmission

- Can diminish network performance.

- Productivity can be impaired due to content

blocking.

- Cannot prevent internal attacks.

Usually encrypted using asymmetric encryption.

This secures your data when transmitted between devices.

There are some implications:

- If working with large quantities of data

it can impact on processing power.

A hardware device or utility program that monitors incoming and outgoing network traffic and blocks any it deems suspicious.

The main method it uses is:

  • Packet filtering

Encryption

Where data is converted into an encoded form so as to prevent unauthorised access.

Two main types of data we encrypt:

  • Stored data
  • Data during transmission

KnowItAllNinja.com

Protecting Data Tools

http://www.knowitallninja.com

Legislation & Codes of Practice

Anti Virus

Features

  • Scheduled scans for certain times of day.
  • On demand scans for whole drive or specific folders.
  • On access scans for files/folders/programs, known as real-time protection.

There are laws designed to protect data & IT systems. These include:

  • Data Protection Act (1998)
  • Computer Misuse Act (1990)

Codes of Practice defied by professional bodies & the ICO give guidelines on best practice & compliance with laws to protect data.

A utility program that is used to prevent malicious software from infecting your computer or remove it from your system.

Two main methods it uses include:

  • Signature Detection
  • Heuristic Detection

Implications

- Requires regular maintenance/updating.

- Doesn't offer total protection.

- Can slow down PC & network performance.

Learn more about creating dynamic, engaging presentations with Prezi