data integrity and security
Download
Skip this Video
Download Presentation
Data Integrity and Security

Loading in 2 Seconds...

play fullscreen
1 / 11

Data Integrity and Security - PowerPoint PPT Presentation


  • 124 Views
  • Uploaded on

Data Integrity and Security. Data integrity. data that has a complete or whole structure a condition in which data has not been altered or destroyed in an unauthorized manner. Wiretapping. any interception of a telephone transmission by accessing the telephone signal itself.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Data Integrity and Security' - len-harmon


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
data integrity
Data integrity
  • data that has a complete or whole structure
  • a condition in which data has not been altered or destroyed in an unauthorized manner
wiretapping
Wiretapping
  • any interception of a telephone transmission by accessing the telephone signal itself
electronic eavesdropping
Electronic eavesdropping
  • the use of an electronic transmitting or recording device to monitor conversations without the consent of the parties
who can legally monitor phone conversations
Who can legally monitor phone conversations?
  • Federal law enforcement officials may tap telephone lines only after showing "probable cause" of unlawful activity and obtaining a court order
  • must limit the surveillance to communications related to the unlawful activity and to a specific period of time, usually 30 days
  • Electronic Communications Privacy Act, 18 USC 2516
how does a cordless phone communicate
How does a cordless phone communicate?
  • Cordless phones operate like mini-radio stations.
  • They send radio signals from the base unit to the handset and from the handset back to the base.
  • These signals can travel as far as a mile from the phone's location
cellular telephones
CELLULAR TELEPHONES
  • Cellular phones send radio signals to low-power transmitters located within "cells" that range from one block to 20 miles across
  • As you travel from cell to cell, the signal carrying your voice is transferred to the nearest transmitter
data encryption
Data encryption
  • the coding (scrambling), of the data before it is transmitted over the communication link
  • Decryption is the decoding (descrambling), of the received data.
algorithm
Algorithm
  • An algorithm is a set of instructions, in this case for scrambling the data
  • A key is a set of specific codes to be used by the algorithm to perform the encryption
protect yourself in data communications
Protect yourself in data communications
  • Keep your system software and patches up to date
  • A personal firewall
  • Keep your anti-virus software up to date
  • Turn off any services you don't need
  • Least secure: Wireless networking
ad