Unit 1 IT Systems Protecting Data and Information
Unit 1 IT Systems Protecting Data and Information
Contents
Privacy and Security ................................................................................................................................ 3
At the back or in your own notes make a distinction between the terms: privacy & security. ... 3
Security and Integrity of data ........................................................................................................... 3
At the back or in your own notes describe key considerations for security and integrity of
data. .................................................................................................................................................... 3
Threats ............................................................................................................................................... 4
At the back or in your own notes describe several common threats to security and integrity of
data. .................................................................................................................................................... 4
Research and describe examples of malicious software. ............................................................ 4
Countermeasures to threats ............................................................................................................. 5
At the back or in your own notes describe key counter measures to common threats. ............ 5
Research and describe examples of cryptography. ..................................................................... 5
Research and describe examples of biometric security techniques. ........................................... 5
Considering on-line systems ............................................................................................................ 6
Research and describe the use of transaction-logs. .................................................................... 6
Research and describe the use of record-locking. ....................................................................... 6
Disaster planning .............................................................................................................................. 7
At the back or in your own notes describe the use of a good backup policy and contingency
planning. ............................................................................................................................................. 7
Unit 1 - INFORMATION TECHNOLOGY SYSTEMS
Protecting Data and Information
Let’s consider a window in your home. It provides different functions for you. It allows you to look
outside. It lets light into your home. It keeps weather outside. You can open a window. In an
emergency, you can use a window as an exit.
A window is also susceptible. Just as you can use it in an emergency as a way out, others can use it as
an entrance. To protect against unwanted visitors, you can put bars or a grate in front of the
window. This still allows you to keep all the desired functionality the window provides. This is
security.
Just as you can look out a window, others can look in. Thwarting unwanted eyes from looking in can
be tackled by putting a blind inside of the window. This is privacy. Obscuring the view inside of
your home also provides a little security as intruders may not be able to tell when you are home or
see the things you own.
Security provides protection for all types of information, in any form, so that the information’s
confidentiality, integrity, and availability are maintained.
Privacy guarantees that personal information is collected, processed (used), protected and
destroyed legally and fairly.
The two interact together because a security program could require credentials to access a network,
after checking these credentials users would be have restricted access to personal information based
upon their access rights.
3] This has to be planned and co-ordinated via a policy, it doesn’t happen by chance.
Many organisations store their company’s data on computer systems and are obviously
heavily reliant on their effective performance. Only when normal operations aren’t
provided, do they realise how dependent they are. All computer systems are predisposed to
some form of failure either minor and temporary, or major.
Threats
At the back or in your own notes describe several common threats to security and
integrity of data.
Research and describe examples of malicious software.
Threats to security and integrity of data exist from numerous sources. They may be
accidental or malicious.
hardware failure
theft
unauthorised use
natural disaster
viruses
disgruntled employees
hackers
accidents
employee accidents
malicious software
Unit 1 - INFORMATION TECHNOLOGY SYSTEMS
Protecting Data and Information
Countermeasures to threats
At the back or in your own notes describe key counter measures to common threats.
Research and describe examples of cryptography.
Research and describe examples of biometric security techniques.
Physical protection involves the use of physical barriers intended to protect against theft
and unauthorised access. The reasoning behind such an approach is extremely simple: if
access to rooms and equipment is restricted, the risk of theft and unauthorised access is
reduced.
For example, an authorised person’s fingerprints are captured, digitised and stored
so that they can be recalled for comparison. On attempted entry to a system, the
user’s fingerprints are captured and digitised. These are then compared against the
stored versions. If there is a successful comparison/match, then entry to the system
is permitted.
Unit 1 - INFORMATION TECHNOLOGY SYSTEMS
Protecting Data and Information
This process of comparison against stored digitised data described above works with
all biometric techniques. There is an original capture and storage. Each new access
to a system requires the same capture but then comparison to the stored data.
• Maintaining security and integrity with on-line systems requires special attention to
access rights and passwords. Added to this the company will need to use record-
locking. Here, one user who is editing a record (for example making a booking) has
sole access to the file for the period where the transaction is taking place. Other
users will see the effects of the changed data from the previous user – for example a
particular seat on a flight not being available.
• Other techniques include transaction logging. Here, a special file is created which
contains information about each transaction. For example, if a user changes
someone’s address, a before and after image will be placed in the transaction log
(showing a copy of the record before and after the update)
Unit 1 - INFORMATION TECHNOLOGY SYSTEMS
Protecting Data and Information
Disaster planning
At the back or in your own notes describe the use of a good backup policy and
contingency planning.
Several threats to data have been outline above. One of the countermeasures was to ensure that a
good backup policy is followed. A key term here is the contingency plan, i.e. how the business
can return to normal operations in event of a disaster affecting its operations.
• Many organisations are totally reliant on their data and computer systems. Many
don’t realise the extent, until they are taken away.
• Consequently, there is a critical need for planning and recovery strategies for the
effects of disasters. Disaster recovery plans (DRPs) aim at ensuring that organisations
can function effectively during and following the occurrence of a disaster.
It’s not as simple as it may sound, and a number of key elements underpin the planning
process:
1] Backups should be planned. The policy should clearly indicate procedures. These
backups should also be checked.
7] A complex task for any recovery procedure must also be to deal with transactions that
were affected/interrupted at the time of the failure.
8] The recovery plan should see that all data is returned as it was before the crisis.
Unit 1 - INFORMATION TECHNOLOGY SYSTEMS
Protecting Data and Information
My Answers