Information security. Data protection measures

12.1.2.1 describe protection measures data and computer systems  such as physical risks, firewalls, encryption, biometrics, computer virus

Information security. Data protection measures

Computer security is the preservation of computing systems and the information that they save and / or retrieve.

Information security skills are currently required by all users.
Only 10% of security measures are technical, and the remaining 90% depend on how much the user cares about the security of their data.

Every user of a computer or mobile device should be able to grasp how to keep their computer, devices, and data secure.  Computer security is everyone’s responsibility.

Core Principles of Cyber Security

Confidentiality – information that should be available only to authorized users.

Integrity means that information cannot be lost or changed from its original state.

Availability – information and systems must always be available to authorised users when needed.

A weakened computer is a threat to everyone.  

A hacked computer can be used to do the following:

  • Record keystrokes and steal passwords
  • Send spam and phishing emails
  • Harvest and sell email addresses and passwords
  • Gain access to restricted or personal information on your computer, or on other systems that you have access to
  • Infect other systems with viruses and other malware
  • Conceal programs that launch attacks on other computers
  • Illegally disseminate music, movies and software
  • Distribute child pornography
  • Produce great volumes of traffic, slowing down the whole system
  • A weakened computer can be utilised for all kinds of harmful purposes.

Many internet security hazards can be prevented.  

Some of the ways computer users can protect themselves against security breaches:

  • Use strong, ambiguous passwords that can’t be easily predicted, and keep them secret.
  • Ensure that your computer, devices and applications are updated with the latest version of the operating system in question.
  • Ensure that your computer is secured with up-to-date antivirus and anti-spyware software.
  • Ignore unknown or unsolicited links and attachments. Don’t download unfamiliar files or programs onto your computer or other devices.
  • Remember that data, especially passwords transmitted through typical wireless connections, is very easy for hackers to capture.
    • Look for ‘https’ in the URL before you input any confidential information or a password. The added s in https means secure, and guarantees a degree of protection not afforded by the standard http markup.
    • Avoid using normal, unencrypted e-mail and unencrypted Instant Messaging if you’re concerned about confidentiality.

Consequences for Security Violations

  • Risk to both the security and the integrity of personal or confidential information
  • Identity theft
  • Data corruption or destruction
  • Unavailability of critical information in an emergency
  • Loss of valuable business information

Sourse: https://teachcomputerscience.com


Topics of the lesson

Physical risks

Firewalls

Encryption

Biometrics

Computer virus

 

 

Категория: Protection data | Добавил: bzfar77 (01.11.2020)
Просмотров: 69 | Теги: Encryption, Retina patterns, physical risks, biometrics, Facial recognition, data protection, finger print, Voice recognition, Firewalls, computer virus | Рейтинг: 0.0/0
Всего комментариев: 0
avatar