15
BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection

BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED Data Protection

Embed Size (px)

Citation preview

BP5- METHODS BY WHICH PERSONAL DATA CAN BE PROTECTED

Data Protection

Network Security

Network security ensures that unauthorised users are prevented from accessing, misusing or editing a computer network

The network administrator controls who can access the files on a network by setting up different types of network security

Network security is essential to safeguard a business, customer and staff information

Network Security

Usernames and PasswordsPassword policyAccess rights and permissions

Usernames and passwords

A username/user ID must be used by a member of staff in a business if they want to log on to a computer or network

It will identify the user to the system so their profile or settings are loaded

For security purposes, a password is required also. It ensures that the person logging in is who they say they are

Cable Ties Ltd will assign usernames but staff choose their own passwords

Password Policy

Passwords should: Be kept private and told to no-one Be changed regularly Not written down Be made up of at least 6 characters Use upper and lower case letters and numbers Be easy to remember but not too easy to guess

Access rights and permissions

Allows the user to control who can read, edit, alter or save files or folders

Cable Ties Ltd can control which files employees such as office staff, technicians or managers can look at

Managers may have more permissions than office staff or technicians etc.

Physical Security

This ensures that all of the hardware of the network is protected from theft and kept safe

There are a number of ways the business can protect against this but it is also down to employees to be aware of the steps they should take to keep their equipment safe

Physical Security

Serial Number everythingAlarms onDoors locked

Fire protectionLock windows/doorsAvoid ground floorBlinds closed

Data Security

This means that there are measures taken to prevent the loss of data held on the system

Your data is much more valuable than your computer equipment –it is priceless so must be kept secure at all times

You can protect your equipment with insurance, but this will not replace your data

Data Security

Password protectRestrict accessBackupsRead only filesEncryptionVirus checksFirewallsBiometric methods (fingerprinting, retina

scanning, face recognition)

Password Protection

Used on files and folders to ensure only those with permission can access sensitive information such as customer details, sales figures etc.

Passwords can be used on documents to restrict opening, editing, saving or copying

Restrict access

When restricting access to a document you have a number of options:

• Encrypt with password – Requires a password to open the document

• Restrict editing – Controls the changes that people can make to the document

• Restrict permission by people – Grants people access to documents but removes ability to edit, copy or print

• Add a digital signature – Adds an invisible digital signature to ensure the integrity of the document

Encryption

This is where you hide the contents of a file so they cannot be easily read if stolen or illegally accessed

Data can be scrambled using data encryption software when it is stored or transmitted

It uses an encryption code or key to scramble (encrypt) the contents of data files

The proper code is needed to unscramble the file (decrypt it) so it can be read or used

Using an encryption key

Be ready at 7.30

AXIT @ TG&Q.>/

Be ready at 7.30

Encryption key used to scramble message

Scrambled message sent

The encrypted message

Same encryption key used to unscramble message

Message written

Message can be read

Virus checks & firewalls

Virus checkers can be used to check information is not corrupted

You can preform virus checkers on a regular basis and a lot of computer systems will do this automatically so data is kept safe

Firewalls are used to prevent hackers from accessing the data from the Internet

They can be turned on and in most businesses the network administrator will have done this for you