Data integrity and security
Download
1 / 11

Data Integrity and Security - PowerPoint PPT Presentation


  • 115 Views
  • Uploaded on

Data Integrity and Security. Data integrity. data that has a complete or whole structure a condition in which data has not been altered or destroyed in an unauthorized manner. Wiretapping. any interception of a telephone transmission by accessing the telephone signal itself.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about ' Data Integrity and Security' - len-harmon


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

Data integrity
Data integrity

  • data that has a complete or whole structure

  • a condition in which data has not been altered or destroyed in an unauthorized manner


Wiretapping
Wiretapping

  • any interception of a telephone transmission by accessing the telephone signal itself


Electronic eavesdropping
Electronic eavesdropping

  • the use of an electronic transmitting or recording device to monitor conversations without the consent of the parties


Who can legally monitor phone conversations
Who can legally monitor phone conversations?

  • Federal law enforcement officials may tap telephone lines only after showing "probable cause" of unlawful activity and obtaining a court order

  • must limit the surveillance to communications related to the unlawful activity and to a specific period of time, usually 30 days

  • Electronic Communications Privacy Act, 18 USC 2516


How does a cordless phone communicate
How does a cordless phone communicate?

  • Cordless phones operate like mini-radio stations.

  • They send radio signals from the base unit to the handset and from the handset back to the base.

  • These signals can travel as far as a mile from the phone's location


Cellular telephones
CELLULAR TELEPHONES

  • Cellular phones send radio signals to low-power transmitters located within "cells" that range from one block to 20 miles across

  • As you travel from cell to cell, the signal carrying your voice is transferred to the nearest transmitter


Data encryption
Data encryption

  • the coding (scrambling), of the data before it is transmitted over the communication link

  • Decryption is the decoding (descrambling), of the received data.


Algorithm
Algorithm

  • An algorithm is a set of instructions, in this case for scrambling the data

  • A key is a set of specific codes to be used by the algorithm to perform the encryption


Protect yourself in data communications
Protect yourself in data communications

  • Keep your system software and patches up to date

  • A personal firewall

  • Keep your anti-virus software up to date

  • Turn off any services you don't need

  • Least secure: Wireless networking



ad