16
© Boardworks Ltd 2010 1 of 16 Keeping Data Safe

© Boardworks Ltd 2010 1 of 16 Keeping Data Safe. © Boardworks Ltd 2010 2 of 16 Teacher’s notes included in the Notes Page Flash activity. These activities

Embed Size (px)

Citation preview

© Boardworks Ltd 20101 of 16

Keeping Data Safe

© Boardworks Ltd 20102 of 16

Teacher’s notes included in the Notes Page

Flash activity. These activities are not editable. Web addresses

Icons key: For more detailed instructions, see the Getting Started presentation

Functional Skills check

Student task accompanies this slide Printable activity

What is data security?

Some of the common threats to computer data.

Ways to keep data secure.

The theory behind public key encryptions.

This lesson will cover:

© Boardworks Ltd 20103 of 16

Data security is about making sure that data is safe from corruption or loss, and that access to it is suitably controlled.

Data security

Where is your data stored? Is it secure?

We often give our personal data to companies and websites without really thinking about whether it is secure or not.

© Boardworks Ltd 20104 of 16

Threats to computer data

© Boardworks Ltd 20105 of 16

Staff might also damage or steal data if they are unhappy with their employers.

The way data gets damaged most often is by people making a mistake – human error. They might:

People and security

enter the wrong data forget to save

save in the wrong place delete an important file.

© Boardworks Ltd 20106 of 16

Passwords

Passwords are often use to protect data.

What makes a strong password?

A system of passwords can be set up to control access at different levels.

For example, in a hospital, a consultant will need access to a patient’s medical records and to prescription data, but the receptionist may only need access to basic patient details and clinic diaries.

© Boardworks Ltd 20107 of 16

Choosing a strong password

© Boardworks Ltd 20108 of 16

Can you steal the data?

© Boardworks Ltd 20109 of 16

Network management software has in-built security features.

Network security

Files can also be set with access levels e.g. read only.

Network users have login names and passwords that are changed regularly.

Network software can perform an audit log to record who logged on to the system and what they did to files.

© Boardworks Ltd 201010 of 16

Access levels

© Boardworks Ltd 201011 of 16

Software security

© Boardworks Ltd 201012 of 16

Backing up

Why is it important to back up data?

Other measures that can help to keep data secure include:

making regular backups of filesstoring backup copies in fireproof safes or offsitestoring important files on removable disks.

External hard disks are often used to back up large amounts of data. Magnetic tapes used to be used for long term archiving.

© Boardworks Ltd 201013 of 16

Data can be protected by physical security, such as:

Physical security controls

locks and alarmssecurity camerasdevices to fix computersin placebiometric readers such as fingerprint or retina scans fire alarmslocking or disabling USB

ports and disk drives.

© Boardworks Ltd 201014 of 16

Public key encryption

© Boardworks Ltd 201015 of 16

How could this data have been better protected?

Data breach

In October 2007, two disks containing the personal details of 25 million people claiming child benefit were lost by HMRC after being sent via courier to the National Audit Office.

The disks were reported to contain the names, addresses and dates of birth of millions of children, plus the National Insurance numbers and bank details of their parents or carers.

© Boardworks Ltd 201016 of 16

Summary