Data integrity and security
This presentation is the property of its rightful owner.
Sponsored Links
1 / 11

Data Integrity and Security PowerPoint PPT Presentation


  • 74 Views
  • Uploaded on
  • Presentation posted in: General

Data Integrity and Security. Data integrity. data that has a complete or whole structure a condition in which data has not been altered or destroyed in an unauthorized manner. Wiretapping. any interception of a telephone transmission by accessing the telephone signal itself.

Download Presentation

Data Integrity and Security

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Data integrity and security

Data Integrity and Security


Data integrity

Data integrity

  • data that has a complete or whole structure

  • a condition in which data has not been altered or destroyed in an unauthorized manner


Wiretapping

Wiretapping

  • any interception of a telephone transmission by accessing the telephone signal itself


Electronic eavesdropping

Electronic eavesdropping

  • the use of an electronic transmitting or recording device to monitor conversations without the consent of the parties


Who can legally monitor phone conversations

Who can legally monitor phone conversations?

  • Federal law enforcement officials may tap telephone lines only after showing "probable cause" of unlawful activity and obtaining a court order

  • must limit the surveillance to communications related to the unlawful activity and to a specific period of time, usually 30 days

  • Electronic Communications Privacy Act, 18 USC 2516


How does a cordless phone communicate

How does a cordless phone communicate?

  • Cordless phones operate like mini-radio stations.

  • They send radio signals from the base unit to the handset and from the handset back to the base.

  • These signals can travel as far as a mile from the phone's location


Cellular telephones

CELLULAR TELEPHONES

  • Cellular phones send radio signals to low-power transmitters located within "cells" that range from one block to 20 miles across

  • As you travel from cell to cell, the signal carrying your voice is transferred to the nearest transmitter


Data encryption

Data encryption

  • the coding (scrambling), of the data before it is transmitted over the communication link

  • Decryption is the decoding (descrambling), of the received data.


Algorithm

Algorithm

  • An algorithm is a set of instructions, in this case for scrambling the data

  • A key is a set of specific codes to be used by the algorithm to perform the encryption


Protect yourself in data communications

Protect yourself in data communications

  • Keep your system software and patches up to date

  • A personal firewall

  • Keep your anti-virus software up to date

  • Turn off any services you don't need

  • Least secure: Wireless networking


Data integrity and security

  • Video


  • Login