1 / 6

Protecting ICT Systems

Internal

abel
Download Presentation

Protecting ICT Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. Protecting ICT Systems AS Module 1 10.3 Heathcote Ch. 11

    2. Internal & external threats Data & programs are vulnerable to both deliberate and accidental damage, ranging from: A floppy disk which becomes unusable To hackers stealing millions from a major organisation Internal threats: Hardware failure Faulty procedures Natural disasters Remote systems or laptops may be lost or not properly operated in terms of back-ups and regular maintenance Dishonest employees External threats Hackers Viruses

    3. Measures to protect systems Physical restrictions Login procedures – UserID and passwords Levels of access Audit software Encryption

    4. Types of backup Online backup Often simultaneous update of 3 systems – one remote from the other 2 Periodic backups Daily – stored off-site in a fireproof safe Possible now to back up to internet providers Backup of laptop data Protects business in the event of loss or failure of machine

    5. Other measures Virus checkers Regular update of virus template is required to combat new viruses Responsible companies do not allow downloads from internet or execution of attachments to e-mail Careful vetting of staff Comprehensive staff training Considered siting of computer equipment to avoid basic disasters like flooding

    6. Internet access issues Internet contains much unsuitable material Schools must guard against: Pupils accessing pornographic materials Participation in chat rooms where pupils may be exposed to undesirable strangers Business may want to control use of e-mail Some organisations achieve this by installing and maintaining their own intranet (private internet) They have a firewall to prevent unsuitable material being downloaded This consists of a proxy server with special hardware and software to maintain security.

More Related