Loading presentation...

Present Remotely

Send the link below via email or IM

Copy

Present to your audience

Start remote presentation

  • Invited audience members will follow you as you navigate and present
  • People invited to a presentation do not need a Prezi account
  • This link expires 10 minutes after you close the presentation
  • A maximum of 30 users can follow your presentation
  • Learn more about this feature in our knowledge base article

Do you really want to delete this prezi?

Neither you, nor the coeditors you shared it with will be able to recover it again.

DeleteCancel

Make your likes visible on Facebook?

Connect your Facebook account to Prezi and let your likes appear on your timeline.
You can change this under Settings & Account at any time.

No, thanks

A2 ICT - Topic 5: Security Policies Part 1

No description
by

Simon Fisher

on 1 February 2011

Comments (0)

Please log in to add your comment.

Report abuse

Transcript of A2 ICT - Topic 5: Security Policies Part 1

Security Policies There are many threats to ICT systems and some are more likely than others. The amount of damage can range from inconvenience to the complete loss of hardware, software and data Would you want to lose money? Measures need to be taken to minimise damage should threats turn into reality. Legal
Action Staff
Time
Lost Customer
Confidence
Lost Lost
Computer
Time Lost
Business What threats? Viruses
Worms
Adware
SPAM
Trojans
Spyware Sabotage
Fire/Natural Disasters
Terrorism
Accidental abuse
Theft
Faulty hardware/software Earthquakes can lead to loss of power and communication lines as well as damage to ICT systems through buildings collapsing Lightning strikes can lead to loss of power and potential data loss. Serious damage could be done to hardware too. Flooding can lead to water damage to hardware and loss of power and communications. Data loss too? Volcanoes can lead to fire and smoke damage as well as destruction of buildings Tidal waves often occure after earthquakes (called tsunamis) and can cause massive damage Hurricanes and gales can lead to a loss of communication lines Natural Disasters! Faulty Hardware/Software? Computer hardware is generally fairly reliable, but it can breakdown. A particular problem is when a hard drive is damaged and data and programmes are then rendered unusable. Software, especially besoke software - though also package software, can contain bugs. These can cause damage or loss of data, and can slow down work. Fire!!! "Don't let your dreams go up in smoke - practice fire safety." - Unknown Fire is a serious threat in the workplace. Precautions need to be taken to minimise the threats no smoking in any computer rooms
power sockets not overloaded
wiring regulary checked
bins emptied regularly
no large quantities of paper left out
fire alarms and smoke detectors
install a sprinkler system
fireproof safes to store media
backup copies kept off-site Theft If a computer is stolen then the hardware and software is lost. Data may be lost too. A firm might be in contravention of the Data Protection Act if it can be proved adequate security measures were not taken. Is the equipmnet small and easily concealed - e.g. laptops?
Is it taken outside of the organisation into public places - e.g. cafes, trains, airports?
Is it left unattended in a car boot?
Is it desirable and easy to sell by thieves? Hacking This involves breaking into a system, or ATTEMPTING to! Usually the hacker is a proficient programmer and has the technical knowledge to exploit weaknesses in the system. Once they have access a hacker might: do nothing - just be content they gained access!
access personal or sensitive data
use personal data to commit blackmail
cause damage to data
deliberately alter data to commit fraud Connecting a network to the Internet increases the risk of viruses being spread to the internal network. The latest virus scanning and removal software should be installed on all computers. Viruses A denial of service attack is an attack on an organisation's secure system so that the organisation is deprived of resources.

For example, an attack on an online shop like Amazon.co.uk would mean their network was so overwhelmed by requests that they temporarily lose network connectivity. You would be unable to place an order during that time of attack.

As well as inconveniencing customers it could lead to a loss of business for the company. Power A standby power system can be used in the event of power loss to keep computers running until mains power is restored.

This normally consists of stored power (for short losses) or a combination of this and a generator. Stored power is a bank of batteries, generators are powered using petrol or diesel.

Battery power is needed even with generators, as there will be a gap between power going out and the generator being started. Standby power is sometimes known as UPS (uninterruptible power supply). What are the consequences? Loss of business and income? Losing customer details and orders will means the company will not be able to fulfil orders
Loss of reputation? Organisation don't look good if they cannot look after data properly.
Legal action? The Data Protection Act 1998 require organisations to keep this data safe - those that fail to do so could face prosecution.
Full transcript