Top Banner
A-Level Computing data damage and prevention
15

A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.

Dec 16, 2015

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.

A-Level Computingdata damage and prevention

Page 2: A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.

Objectives•To know the dangers associated with a

computer system

•To understand the methods of prevention

•To be able to demonstrate the need for prevention methods

Page 3: A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.

Privacy & Security•What can cause damage to a computer

system?

Page 4: A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.

Privacy & Security•Accidental & Malicious Damage

•Hardware failure - all hardware dies eventually.

•Software Failure - programming bugs

•Human Errors - hanging of data or deletion of files

•Malicious Damage - angry employee, a virus or a hacker.

Page 5: A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.

Privacy & Security•Any loss or corruption of data will have

serious or fatal implications for the performance of the application

•Delays, loss of business and possible legal action may result.

Page 6: A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.

Privacy & Security•What can you do to prevent damage to

your computer system

Page 7: A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.

Privacy & Security•Physical security

•Security Guards

•Alarms

•Locks

•Swipe/ID Cards

•Read/Write Tabs

Page 8: A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.

Privacy & Security•In order to gain access to the system a

user is supplied with a user name together with a personal password.

•Operating system will check the user name and password are valid before allowing the user to log in.

•Some files may be open by anyone, others only by those users with a particular level of access.

Page 9: A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.

Privacy & Security•The file itself has attributes that can be

set. The commonly used ones in Windows are:

•Read-only - the file can be read but not altered

•Hidden - the file is not displayed in listings of files.

Page 10: A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.

Privacy & Security•Computers connected to networks -

especially the Internet - need to be protected from hackers.

•Firewalls are software methods of blocking access to anyone from outside a network unless they are authorised.

Page 11: A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.

Privacy & Security•To maintain file security when data is

transferred from one computer to another the data can be encrypted.

•This means that the data is encoded in some way before it is sent, and therefore meaningless to anyone intercepting the message.

•The data is then decoded at the receiving end by the user who knows the way to decrypt it (often referred to as the key).

Page 12: A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.

Privacy & Security•Key - next letter along in alphabet:

•IFMMP XPSME

•HELLO WORLD

•Data encryption can also be used when data is stored on a file. A hacker accessing the data will find it meaningless unless he has the key.

Page 13: A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.

Privacy & Security•Important files of data should be

regularly backed up - this means making another copy of the data and storing the copy in a different place.

•Many organisations run a daily backup - scheduled to run overnight, but backups can be done any time.

•Backups may be stored on the same computer - but it is better to store them on a different one.

Page 14: A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.

Privacy & Security•Backups of data may also be stored on

backing storage media such as CD, DVD or tape cartridge.

•The backup copies should be stored securely - a locked room or a fire-proof safe.

•As broadband Internet access becomes more widespread, backups to remote sites are becoming more popular.

Page 15: A-Level Computing data damage and prevention. Objectives To know the dangers associated with a computer system To understand the methods of prevention.

Privacy & Security•If data is accidentally or deliberately

lost or damaged, the backup data should be loaded.

•All changes to the data since the backup was made will need to be done again.