Protecting ICT Systems - PowerPoint PPT Presentation

1 / 6
About This Presentation
Title:

Protecting ICT Systems

Description:

A floppy disk which becomes unusable. To hackers stealing millions from a major organisation ... procedures UserID and passwords. Levels of access. Audit ... – PowerPoint PPT presentation

Number of Views:60
Avg rating:3.0/5.0
Slides: 7
Provided by: graham147
Category:

less

Transcript and Presenter's Notes

Title: Protecting ICT Systems


1
Protecting ICT Systems
2
Internal external threats
  • Data programs are vulnerable to both deliberate
    and accidental damage, ranging from
  • A floppy disk which becomes unusable
  • To hackers stealing millions from a major
    organisation
  • Internal threats
  • Hardware failure
  • Faulty procedures
  • Natural disasters
  • Remote systems or laptops may be lost or not
    properly operated in terms of back-ups and
    regular maintenance
  • Dishonest employees
  • External threats
  • Hackers
  • Viruses

3
Measures to protect systems
  • Physical restrictions
  • Login procedures UserID and passwords
  • Levels of access
  • Audit software
  • Encryption

4
Types of backup
  • Online backup
  • Often simultaneous update of 3 systems one
    remote from the other 2
  • Periodic backups
  • Daily stored off-site in a fireproof safe
  • Possible now to back up to internet providers
  • Backup of laptop data
  • Protects business in the event of loss or failure
    of machine

5
Other measures
  • Virus checkers
  • Regular update of virus template is required to
    combat new viruses
  • Responsible companies do not allow downloads from
    internet or execution of attachments to e-mail
  • Careful vetting of staff
  • Comprehensive staff training
  • Considered siting of computer equipment to avoid
    basic disasters like flooding

6
Internet access issues
  • Internet contains much unsuitable material
  • Schools must guard against
  • Pupils accessing pornographic materials
  • Participation in chat rooms where pupils may be
    exposed to undesirable strangers
  • Business may want to control use of e-mail
  • Some organisations achieve this by installing and
    maintaining their own intranet (private internet)
  • They have a firewall to prevent unsuitable
    material being downloaded
  • This consists of a proxy server with special
    hardware and software to maintain security.
Write a Comment
User Comments (0)
About PowerShow.com