Top Banner
Security Procedures
24
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security Procedures

Security Procedures

Page 2: Security Procedures

Ten Commandments

of Computer ethics

Page 3: Security Procedures

10 Commandments of computer ethics

1. Thou shall not use a computer to harm other people

2. Thou shall not interfere with other people's computer work.

3. Thou shall not snoop around in other people's computer files.

4. Thou shall not use a computer to steal.

5. Thou shall not use a computer to bear false witness.

Page 4: Security Procedures

10 Commandments of computer ethics

6. Thou shall not copy or use proprietary software for which you have not paid.

7. Thou shall not use other people's computer resources without authorization or proper compensation.

8. Thou shall not appropriate other people's intellectual output.

9. Thou shall think about the social consequences of the program you are writing or the system you are designing.

10. Thou shall always use a computer in ways that ensure consideration and respect for your fellow humans.

Page 5: Security Procedures

The information used by an

organization usually originates

in one of three ways. It includes;

Page 6: Security Procedures

1. Produced from data collected by the organization.

2. Produced from data collected by an outside source.

3. Purchased in a pre-processed format from an outside source.

Page 7: Security Procedures

Security Procedure

Page 8: Security Procedures

Stages of information Processing.

Procedures to secure against accidental damage.

Procedures to secure against deliberate

intrusion.

Data Entry •Electronic validation.•On-screen reminders of security procedures.

•Password access to equipment and files.•Knowledge and verification of source data.

Processing •Program testing.•Matching to template.•Check digit in the binary code, known as a ‘parity bit’.

•Program testing •Matching run times; if a program takes longer than expected it may have been caused by an intrusion.

Information Output

•Random proofreading, as in newspaper•On-screen reminders about saving files•Read only files where appropriate

•Logging of every output attempt •Password access to output devices.

Communication •Clear, dated source identity•Verification of destination identify before transmission.

•Encryption of information•Logging destination addresses•Logging the terminal address used to communicate the info.

Page 9: Security Procedures

Protecting the

integrity of data

Page 10: Security Procedures

Methods of protecting the

integrity of data

Methods of guaranteeing the

software processes

Method of securing the information products

Password access to terminal

Regular file matching that guard against hacker entry to a system.

Password access to editing functions.

ID location badge for staff using cash register

Virus detection programs that run at critical events in the program.

Read-only files where possible

Biometric identify such as fingerprint and iris scan

Encryption download with scan.

Protecting the integrity of data

Page 11: Security Procedures

Security for information received

Page 12: Security Procedures

Security for information received 1. When ENTERING

2. While OPEN in their system

3. When EXITING

Page 13: Security Procedures

Security for information produced.

Page 14: Security Procedures

Security for

information

produced.•Regular Back-ups•File Access Restriction

Page 15: Security Procedures

Regular Back-Ups

In organizations where staff are using computers at the desktop for a range

of tasks during the day, autosave is only one part

of back-up procedures used to secure information.

Page 16: Security Procedures

Additional Back-up procedures includes;

1. screen messages instructing operators to back-up work on a floppy disk when a tasks is completed.

2. automatic log-out and save after 10 minutes of inactivity.

Page 17: Security Procedures

Additional Back-up procedures includes;

3. saving and printing controlled copies of files required for proofing or by a reference group.

4. saving all files and folders on the network to a tape, disk, cartridge, etc. which is then dated and locked in a secure fireproof cupboard.

Page 18: Security Procedures

File Access

Restrictions

Page 19: Security Procedures

File Access Restrictions

Passwords are playing important

role in controlling the security of

information produced by organization.

Page 20: Security Procedures

File Access Restrictions

Features include:

• structure of hierarchy• allocation• duration

Page 21: Security Procedures

BOSS

Staff Manager

Financial Manager

Stock Manager

Rosters Staff Records Accounts Payroll Orders Advertising

Page 22: Security Procedures

Security for information

communicated

Information produced electronically by an organization can be communicated via range of media that includes;

CableDisk/CD-ROM

Internet/e-mailGraphics

microwave

Page 23: Security Procedures

Procedures to protect

information communicated by an organization

• newspapers need classified advertisements with correct phone and price details.

• libraries need an up-to-date list of all titles available to borrowers.

Page 24: Security Procedures

Thank You!