Security Procedures
-
Upload
markilyn -
Category
Technology
-
view
211 -
download
1
description
Transcript of Security Procedures
![Page 1: Security Procedures](https://reader035.fdocuments.in/reader035/viewer/2022062513/5561f429d8b42a2a488b47a9/html5/thumbnails/1.jpg)
Security Procedures
![Page 2: Security Procedures](https://reader035.fdocuments.in/reader035/viewer/2022062513/5561f429d8b42a2a488b47a9/html5/thumbnails/2.jpg)
Ten Commandments
of Computer ethics
![Page 3: Security Procedures](https://reader035.fdocuments.in/reader035/viewer/2022062513/5561f429d8b42a2a488b47a9/html5/thumbnails/3.jpg)
10 Commandments of computer ethics
1. Thou shall not use a computer to harm other people
2. Thou shall not interfere with other people's computer work.
3. Thou shall not snoop around in other people's computer files.
4. Thou shall not use a computer to steal.
5. Thou shall not use a computer to bear false witness.
![Page 4: Security Procedures](https://reader035.fdocuments.in/reader035/viewer/2022062513/5561f429d8b42a2a488b47a9/html5/thumbnails/4.jpg)
10 Commandments of computer ethics
6. Thou shall not copy or use proprietary software for which you have not paid.
7. Thou shall not use other people's computer resources without authorization or proper compensation.
8. Thou shall not appropriate other people's intellectual output.
9. Thou shall think about the social consequences of the program you are writing or the system you are designing.
10. Thou shall always use a computer in ways that ensure consideration and respect for your fellow humans.
![Page 5: Security Procedures](https://reader035.fdocuments.in/reader035/viewer/2022062513/5561f429d8b42a2a488b47a9/html5/thumbnails/5.jpg)
The information used by an
organization usually originates
in one of three ways. It includes;
![Page 6: Security Procedures](https://reader035.fdocuments.in/reader035/viewer/2022062513/5561f429d8b42a2a488b47a9/html5/thumbnails/6.jpg)
1. Produced from data collected by the organization.
2. Produced from data collected by an outside source.
3. Purchased in a pre-processed format from an outside source.
![Page 7: Security Procedures](https://reader035.fdocuments.in/reader035/viewer/2022062513/5561f429d8b42a2a488b47a9/html5/thumbnails/7.jpg)
Security Procedure
![Page 8: Security Procedures](https://reader035.fdocuments.in/reader035/viewer/2022062513/5561f429d8b42a2a488b47a9/html5/thumbnails/8.jpg)
Stages of information Processing.
Procedures to secure against accidental damage.
Procedures to secure against deliberate
intrusion.
Data Entry •Electronic validation.•On-screen reminders of security procedures.
•Password access to equipment and files.•Knowledge and verification of source data.
Processing •Program testing.•Matching to template.•Check digit in the binary code, known as a ‘parity bit’.
•Program testing •Matching run times; if a program takes longer than expected it may have been caused by an intrusion.
Information Output
•Random proofreading, as in newspaper•On-screen reminders about saving files•Read only files where appropriate
•Logging of every output attempt •Password access to output devices.
Communication •Clear, dated source identity•Verification of destination identify before transmission.
•Encryption of information•Logging destination addresses•Logging the terminal address used to communicate the info.
![Page 9: Security Procedures](https://reader035.fdocuments.in/reader035/viewer/2022062513/5561f429d8b42a2a488b47a9/html5/thumbnails/9.jpg)
Protecting the
integrity of data
![Page 10: Security Procedures](https://reader035.fdocuments.in/reader035/viewer/2022062513/5561f429d8b42a2a488b47a9/html5/thumbnails/10.jpg)
Methods of protecting the
integrity of data
Methods of guaranteeing the
software processes
Method of securing the information products
Password access to terminal
Regular file matching that guard against hacker entry to a system.
Password access to editing functions.
ID location badge for staff using cash register
Virus detection programs that run at critical events in the program.
Read-only files where possible
Biometric identify such as fingerprint and iris scan
Encryption download with scan.
Protecting the integrity of data
![Page 11: Security Procedures](https://reader035.fdocuments.in/reader035/viewer/2022062513/5561f429d8b42a2a488b47a9/html5/thumbnails/11.jpg)
Security for information received
![Page 12: Security Procedures](https://reader035.fdocuments.in/reader035/viewer/2022062513/5561f429d8b42a2a488b47a9/html5/thumbnails/12.jpg)
Security for information received 1. When ENTERING
2. While OPEN in their system
3. When EXITING
![Page 13: Security Procedures](https://reader035.fdocuments.in/reader035/viewer/2022062513/5561f429d8b42a2a488b47a9/html5/thumbnails/13.jpg)
Security for information produced.
![Page 14: Security Procedures](https://reader035.fdocuments.in/reader035/viewer/2022062513/5561f429d8b42a2a488b47a9/html5/thumbnails/14.jpg)
Security for
information
produced.•Regular Back-ups•File Access Restriction
![Page 15: Security Procedures](https://reader035.fdocuments.in/reader035/viewer/2022062513/5561f429d8b42a2a488b47a9/html5/thumbnails/15.jpg)
Regular Back-Ups
In organizations where staff are using computers at the desktop for a range
of tasks during the day, autosave is only one part
of back-up procedures used to secure information.
![Page 16: Security Procedures](https://reader035.fdocuments.in/reader035/viewer/2022062513/5561f429d8b42a2a488b47a9/html5/thumbnails/16.jpg)
Additional Back-up procedures includes;
1. screen messages instructing operators to back-up work on a floppy disk when a tasks is completed.
2. automatic log-out and save after 10 minutes of inactivity.
![Page 17: Security Procedures](https://reader035.fdocuments.in/reader035/viewer/2022062513/5561f429d8b42a2a488b47a9/html5/thumbnails/17.jpg)
Additional Back-up procedures includes;
3. saving and printing controlled copies of files required for proofing or by a reference group.
4. saving all files and folders on the network to a tape, disk, cartridge, etc. which is then dated and locked in a secure fireproof cupboard.
![Page 18: Security Procedures](https://reader035.fdocuments.in/reader035/viewer/2022062513/5561f429d8b42a2a488b47a9/html5/thumbnails/18.jpg)
File Access
Restrictions
![Page 19: Security Procedures](https://reader035.fdocuments.in/reader035/viewer/2022062513/5561f429d8b42a2a488b47a9/html5/thumbnails/19.jpg)
File Access Restrictions
Passwords are playing important
role in controlling the security of
information produced by organization.
![Page 20: Security Procedures](https://reader035.fdocuments.in/reader035/viewer/2022062513/5561f429d8b42a2a488b47a9/html5/thumbnails/20.jpg)
File Access Restrictions
Features include:
• structure of hierarchy• allocation• duration
![Page 21: Security Procedures](https://reader035.fdocuments.in/reader035/viewer/2022062513/5561f429d8b42a2a488b47a9/html5/thumbnails/21.jpg)
BOSS
Staff Manager
Financial Manager
Stock Manager
Rosters Staff Records Accounts Payroll Orders Advertising
![Page 22: Security Procedures](https://reader035.fdocuments.in/reader035/viewer/2022062513/5561f429d8b42a2a488b47a9/html5/thumbnails/22.jpg)
Security for information
communicated
Information produced electronically by an organization can be communicated via range of media that includes;
CableDisk/CD-ROM
Internet/e-mailGraphics
microwave
![Page 23: Security Procedures](https://reader035.fdocuments.in/reader035/viewer/2022062513/5561f429d8b42a2a488b47a9/html5/thumbnails/23.jpg)
Procedures to protect
information communicated by an organization
• newspapers need classified advertisements with correct phone and price details.
• libraries need an up-to-date list of all titles available to borrowers.
![Page 24: Security Procedures](https://reader035.fdocuments.in/reader035/viewer/2022062513/5561f429d8b42a2a488b47a9/html5/thumbnails/24.jpg)
Thank You!