SlideShare a Scribd company logo
1 of 23
UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Privacy Issues
UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Know about privacy issues associated with computers, such as adopting good password policies.  Understand what is meant by user I.D and differentiate between user I.D and password. Understand the term access rights and know why access rights are important.
UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Information stored on computers All computers from laptop computers to mainframes contain information. Much of this, whether corporate or personal, is confidential. Many thousands of laptop computers containing important company or state information have been stolen. Since most corporate records are now kept in electronic form on computer systems, procedures need to be put in place to protect the computers.
UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Topics Physical procedures Password Policies Data Encryption Software procedures Also …… Vulnerability of Data (Backup)
UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Physical procedures
UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Physical access to mainframes should be restricted to operators and systems administrators. Facilities should be fire and flood proof. Highly sensitive installations should also have adequate protection from criminal and terrorist activities. Physical procedures
UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Physical procedures Desktop and laptop computers are very vulnerable to theft. A simple procedure is to only allow authorized people access to offices. The uses of security cameras can also act as a deterrent. Desktop computers can be physically attached to the floor or a work surface.
UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Software procedures
UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Software procedures Firewalls A firewall is the first line of defense against hackers. It is a computer program that is installed on a computer that connect a network to the Internet. The firewall analyses the packets that pass in and out of the network. It is programmed to follow certain rules which enable it to decide whether or not to allow a packet to pass. There is firewall software that can be installed on a  stand-alone PC.
UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering S oftware procedures Access rights Access rights can refer to both physical and software. In a physical sense, these refer to different members of staff who have to gain physical access to the certain areas. For example, access to room containing the mainframe may be restricted to operators. Software rights refer to the levels of access different users have to different levels of data and information.  For example, some users may have no access to certain data, may only be able to read the data but not change it. Others in turn may have full rights to create and change data. Access rights to associated with a user id and password. A user id could be a user name or a combination of letters and numbers
UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Password Policies
UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Password policies Password policies refer to guidelines or requirement on the structure and use of passwords. They can be required for access to a computer system or a group of files or a single file.
UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering The following are some guidelines for password policies: They should not be the names of family members or pets or anything else that would be easy for an intruder to try out. They should never be blank . Ideally they should never be words like administrator, admin or root.
UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering They should never be less than five characters and preferably longer. Short passwords can easily determined by a brute force password cracker. This is a piece of software that repeatedly feeds in all combinations of letters and numbers until accessed is gained. With sort passwords this can be done in seconds. A good policy is to use a meaningless combination of letters and numbers that is seven or eight characters long. What some users do is to take a meaningful word such as looking and replace the o with  the number 0 and the letter I with the number 1 so that the password becomes 100k1ng. You could also make less obvious change, for example replace k w/ 3 and g w/ 9 so that the password becomes loo3in9. Passwords should be changed on a regular basis. Administrators can set a policy that automatically causes passwords to expire after a certain period of time, for example 7 days.
UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Data Encryption Data should be encrypted. Encryption scrambles the data and makes it unintelligible without the use of a key. The key is used to decipher the data.
UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Vulnerability of Data (Data Backup)
UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Know about the purpose and value of backing up data, software to a removable storage device.
UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Data is vulnerable in many ways: The system on which it is stored can fail. For example, a hard drive may crash due to component failure. The medium itself may become corrupt. Where data is stored on a magnetic medium, this can become corrupt due to a number of factors including moisture, heat, magnetic fields and electromagnetic radiation. Even optical storage which is highly reliable should never be regarded as infallible.
UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering The system can be stolen. The system could be physically damaged through war, criminal, activity, vandalism, or careless. The system could be damaged a result of a natural disaster such as a floods, fire, or earthquake . The data could be deleted or changed through criminal activity, vandalism, or carelessness.
UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering (Data Backup)
UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering The following are some guidelines to working with backups. Once backups have been created, they should be store in a secure area at a different site. Never keep backups on the same site as the system. Backups should be made on a very regular basis. Even for small organization, this should be done daily. Even the loss of a single day’s work would be a major problem. In large organizations backing up may take place on an on-going basis. A schedule of backing up should be clear policy adhered to.
UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering More than one copy of data should be made. If the data is very valuable, the different copies could be stored in different secure locations. Different versions of the backup should be retained. The following is an example that could be followed. Prepared by: Johanna May D. Azaula College of Computer Science and Engineering
UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Group 4 The Great Ones Johanna May D. Azaula Danica Villaflor Louie Tamayo Reylen Maturingan Kuya Joseph

More Related Content

What's hot

Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesAqib Syed
 
Impact of i.t system breaches
Impact of i.t system breachesImpact of i.t system breaches
Impact of i.t system breachesOriginalGSM
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
 
Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical ChallengesRam Dutt Shukla
 
Business Value of Security and Control
Business Value of Security and ControlBusiness Value of Security and Control
Business Value of Security and ControlSyama Raveendran
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical ChallengesPriya Diana Mercy
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness trainingSAROJ BEHERA
 

What's hot (8)

Chap13 Security and Ethical Challenges
Chap13 Security and Ethical ChallengesChap13 Security and Ethical Challenges
Chap13 Security and Ethical Challenges
 
Impact of i.t system breaches
Impact of i.t system breachesImpact of i.t system breaches
Impact of i.t system breaches
 
Is roles
Is rolesIs roles
Is roles
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 
Security And Ethical Challenges
Security And  Ethical  ChallengesSecurity And  Ethical  Challenges
Security And Ethical Challenges
 
Business Value of Security and Control
Business Value of Security and ControlBusiness Value of Security and Control
Business Value of Security and Control
 
VTU - MIS Module 8 - Security and Ethical Challenges
VTU - MIS Module 8 -  Security and Ethical ChallengesVTU - MIS Module 8 -  Security and Ethical Challenges
VTU - MIS Module 8 - Security and Ethical Challenges
 
Isms awareness training
Isms awareness trainingIsms awareness training
Isms awareness training
 

Viewers also liked

Oer en MOOCs VLHORA studiedag 2014 fred truyen
Oer en MOOCs VLHORA studiedag 2014   fred truyenOer en MOOCs VLHORA studiedag 2014   fred truyen
Oer en MOOCs VLHORA studiedag 2014 fred truyenFtruyen
 
Короли интернета
Короли интернетаКороли интернета
Короли интернетаalberton8
 
Fotoalbom
FotoalbomFotoalbom
Fotoalbomrevizon
 
O Que Me Deixa Feliz
O Que Me Deixa FelizO Que Me Deixa Feliz
O Que Me Deixa Felizgueste6939a
 
Короли интернета
Короли интернетаКороли интернета
Короли интернетаalberton8
 
split up syllabus_ip,cs-xi,xii
split up syllabus_ip,cs-xi,xiisplit up syllabus_ip,cs-xi,xii
split up syllabus_ip,cs-xi,xiiSooraj Mohan
 
The Many Good Reasons for Open Educational Resources
The Many Good Reasons for Open Educational ResourcesThe Many Good Reasons for Open Educational Resources
The Many Good Reasons for Open Educational ResourcesFtruyen
 
Design for service
Design for serviceDesign for service
Design for serviceweizhou
 
Nuclear Chemistry: Nuclear fission
Nuclear Chemistry: Nuclear fissionNuclear Chemistry: Nuclear fission
Nuclear Chemistry: Nuclear fissionSooraj Mohan
 
Brandosphere(Mmfr)
Brandosphere(Mmfr)Brandosphere(Mmfr)
Brandosphere(Mmfr)alberton8
 

Viewers also liked (17)

The Lost City Of Atlantis
The Lost City Of AtlantisThe Lost City Of Atlantis
The Lost City Of Atlantis
 
Vuelodegansos
VuelodegansosVuelodegansos
Vuelodegansos
 
Seminar
SeminarSeminar
Seminar
 
Oer en MOOCs VLHORA studiedag 2014 fred truyen
Oer en MOOCs VLHORA studiedag 2014   fred truyenOer en MOOCs VLHORA studiedag 2014   fred truyen
Oer en MOOCs VLHORA studiedag 2014 fred truyen
 
Seminar
SeminarSeminar
Seminar
 
Короли интернета
Короли интернетаКороли интернета
Короли интернета
 
Fotoalbom
FotoalbomFotoalbom
Fotoalbom
 
O Que Me Deixa Feliz
O Que Me Deixa FelizO Que Me Deixa Feliz
O Que Me Deixa Feliz
 
Короли интернета
Короли интернетаКороли интернета
Короли интернета
 
Water pollution
Water pollutionWater pollution
Water pollution
 
split up syllabus_ip,cs-xi,xii
split up syllabus_ip,cs-xi,xiisplit up syllabus_ip,cs-xi,xii
split up syllabus_ip,cs-xi,xii
 
Chemical bonding
Chemical bondingChemical bonding
Chemical bonding
 
Lesson Transcript
Lesson TranscriptLesson Transcript
Lesson Transcript
 
The Many Good Reasons for Open Educational Resources
The Many Good Reasons for Open Educational ResourcesThe Many Good Reasons for Open Educational Resources
The Many Good Reasons for Open Educational Resources
 
Design for service
Design for serviceDesign for service
Design for service
 
Nuclear Chemistry: Nuclear fission
Nuclear Chemistry: Nuclear fissionNuclear Chemistry: Nuclear fission
Nuclear Chemistry: Nuclear fission
 
Brandosphere(Mmfr)
Brandosphere(Mmfr)Brandosphere(Mmfr)
Brandosphere(Mmfr)
 

Similar to Joan Cs1

A New Frontier in Securing Sensitive Information – Taneja Group, April 2007
A New Frontier in Securing Sensitive Information – Taneja Group, April 2007A New Frontier in Securing Sensitive Information – Taneja Group, April 2007
A New Frontier in Securing Sensitive Information – Taneja Group, April 2007LindaWatson19
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to itIT-Toolkits.org
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT SecurityAjay Jassi
 
Keep Student information protected while improving services
Keep Student information protected while improving servicesKeep Student information protected while improving services
Keep Student information protected while improving servicesCloudMask inc.
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET Journal
 
Capabilities of Computing Technology
Capabilities of Computing TechnologyCapabilities of Computing Technology
Capabilities of Computing TechnologyBimpe Animashaun
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklistbackdoor
 
Information Technology Question.pdf
Information Technology Question.pdfInformation Technology Question.pdf
Information Technology Question.pdfbkbk37
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageIaetsd Iaetsd
 
Computer Literacy Lesson 31
Computer Literacy Lesson 31Computer Literacy Lesson 31
Computer Literacy Lesson 31cpashke
 
SENG8060_Lesson01_Introduction (2).pptx
SENG8060_Lesson01_Introduction (2).pptxSENG8060_Lesson01_Introduction (2).pptx
SENG8060_Lesson01_Introduction (2).pptxVatsalPatel147291
 
APAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds SecurityAPAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds SecuritySolarWinds
 
Cat21:Development Mangement Information Systems
Cat21:Development Mangement Information SystemsCat21:Development Mangement Information Systems
Cat21:Development Mangement Information SystemsSimeon Ogao
 
Protecting Personal Information A Guide for Businesses Small Bu.docx
Protecting Personal Information A Guide for Businesses Small Bu.docxProtecting Personal Information A Guide for Businesses Small Bu.docx
Protecting Personal Information A Guide for Businesses Small Bu.docxbriancrawford30935
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecuritySmartCompliance
 
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docxdurantheseldine
 
vip_day_2._1130_cloud
vip_day_2._1130_cloudvip_day_2._1130_cloud
vip_day_2._1130_cloudNicholas Chia
 
CYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptxCYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptxDCEISO580thACWW
 

Similar to Joan Cs1 (20)

A New Frontier in Securing Sensitive Information – Taneja Group, April 2007
A New Frontier in Securing Sensitive Information – Taneja Group, April 2007A New Frontier in Securing Sensitive Information – Taneja Group, April 2007
A New Frontier in Securing Sensitive Information – Taneja Group, April 2007
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
10 security problems unique to it
10 security problems unique to it10 security problems unique to it
10 security problems unique to it
 
Managing IT Security
Managing IT SecurityManaging IT Security
Managing IT Security
 
Keep Student information protected while improving services
Keep Student information protected while improving servicesKeep Student information protected while improving services
Keep Student information protected while improving services
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
 
Capabilities of Computing Technology
Capabilities of Computing TechnologyCapabilities of Computing Technology
Capabilities of Computing Technology
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklist
 
Information Technology Question.pdf
Information Technology Question.pdfInformation Technology Question.pdf
Information Technology Question.pdf
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 
iaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storageiaetsd Using encryption to increase the security of network storage
iaetsd Using encryption to increase the security of network storage
 
Computer Literacy Lesson 31
Computer Literacy Lesson 31Computer Literacy Lesson 31
Computer Literacy Lesson 31
 
SENG8060_Lesson01_Introduction (2).pptx
SENG8060_Lesson01_Introduction (2).pptxSENG8060_Lesson01_Introduction (2).pptx
SENG8060_Lesson01_Introduction (2).pptx
 
APAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds SecurityAPAC Partner Update: SolarWinds Security
APAC Partner Update: SolarWinds Security
 
Cat21:Development Mangement Information Systems
Cat21:Development Mangement Information SystemsCat21:Development Mangement Information Systems
Cat21:Development Mangement Information Systems
 
Protecting Personal Information A Guide for Businesses Small Bu.docx
Protecting Personal Information A Guide for Businesses Small Bu.docxProtecting Personal Information A Guide for Businesses Small Bu.docx
Protecting Personal Information A Guide for Businesses Small Bu.docx
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
 
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
1594884 - Pearson Education Limited ©Q7-8 2026 Within t.docx
 
vip_day_2._1130_cloud
vip_day_2._1130_cloudvip_day_2._1130_cloud
vip_day_2._1130_cloud
 
CYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptxCYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptx
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Victor Rentea
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 

Recently uploaded (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 

Joan Cs1

  • 1. UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Privacy Issues
  • 2. UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Know about privacy issues associated with computers, such as adopting good password policies. Understand what is meant by user I.D and differentiate between user I.D and password. Understand the term access rights and know why access rights are important.
  • 3. UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Information stored on computers All computers from laptop computers to mainframes contain information. Much of this, whether corporate or personal, is confidential. Many thousands of laptop computers containing important company or state information have been stolen. Since most corporate records are now kept in electronic form on computer systems, procedures need to be put in place to protect the computers.
  • 4. UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Topics Physical procedures Password Policies Data Encryption Software procedures Also …… Vulnerability of Data (Backup)
  • 5. UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Physical procedures
  • 6. UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Physical access to mainframes should be restricted to operators and systems administrators. Facilities should be fire and flood proof. Highly sensitive installations should also have adequate protection from criminal and terrorist activities. Physical procedures
  • 7. UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Physical procedures Desktop and laptop computers are very vulnerable to theft. A simple procedure is to only allow authorized people access to offices. The uses of security cameras can also act as a deterrent. Desktop computers can be physically attached to the floor or a work surface.
  • 8. UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Software procedures
  • 9. UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Software procedures Firewalls A firewall is the first line of defense against hackers. It is a computer program that is installed on a computer that connect a network to the Internet. The firewall analyses the packets that pass in and out of the network. It is programmed to follow certain rules which enable it to decide whether or not to allow a packet to pass. There is firewall software that can be installed on a stand-alone PC.
  • 10. UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering S oftware procedures Access rights Access rights can refer to both physical and software. In a physical sense, these refer to different members of staff who have to gain physical access to the certain areas. For example, access to room containing the mainframe may be restricted to operators. Software rights refer to the levels of access different users have to different levels of data and information. For example, some users may have no access to certain data, may only be able to read the data but not change it. Others in turn may have full rights to create and change data. Access rights to associated with a user id and password. A user id could be a user name or a combination of letters and numbers
  • 11. UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Password Policies
  • 12. UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Password policies Password policies refer to guidelines or requirement on the structure and use of passwords. They can be required for access to a computer system or a group of files or a single file.
  • 13. UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering The following are some guidelines for password policies: They should not be the names of family members or pets or anything else that would be easy for an intruder to try out. They should never be blank . Ideally they should never be words like administrator, admin or root.
  • 14. UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering They should never be less than five characters and preferably longer. Short passwords can easily determined by a brute force password cracker. This is a piece of software that repeatedly feeds in all combinations of letters and numbers until accessed is gained. With sort passwords this can be done in seconds. A good policy is to use a meaningless combination of letters and numbers that is seven or eight characters long. What some users do is to take a meaningful word such as looking and replace the o with the number 0 and the letter I with the number 1 so that the password becomes 100k1ng. You could also make less obvious change, for example replace k w/ 3 and g w/ 9 so that the password becomes loo3in9. Passwords should be changed on a regular basis. Administrators can set a policy that automatically causes passwords to expire after a certain period of time, for example 7 days.
  • 15. UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Data Encryption Data should be encrypted. Encryption scrambles the data and makes it unintelligible without the use of a key. The key is used to decipher the data.
  • 16. UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Vulnerability of Data (Data Backup)
  • 17. UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Know about the purpose and value of backing up data, software to a removable storage device.
  • 18. UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Data is vulnerable in many ways: The system on which it is stored can fail. For example, a hard drive may crash due to component failure. The medium itself may become corrupt. Where data is stored on a magnetic medium, this can become corrupt due to a number of factors including moisture, heat, magnetic fields and electromagnetic radiation. Even optical storage which is highly reliable should never be regarded as infallible.
  • 19. UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering The system can be stolen. The system could be physically damaged through war, criminal, activity, vandalism, or careless. The system could be damaged a result of a natural disaster such as a floods, fire, or earthquake . The data could be deleted or changed through criminal activity, vandalism, or carelessness.
  • 20. UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering (Data Backup)
  • 21. UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering The following are some guidelines to working with backups. Once backups have been created, they should be store in a secure area at a different site. Never keep backups on the same site as the system. Backups should be made on a very regular basis. Even for small organization, this should be done daily. Even the loss of a single day’s work would be a major problem. In large organizations backing up may take place on an on-going basis. A schedule of backing up should be clear policy adhered to.
  • 22. UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering More than one copy of data should be made. If the data is very valuable, the different copies could be stored in different secure locations. Different versions of the backup should be retained. The following is an example that could be followed. Prepared by: Johanna May D. Azaula College of Computer Science and Engineering
  • 23. UNIVERSITY OF REGINA CARMELI Catmon Malolos City College of Computer Science and Engineering Group 4 The Great Ones Johanna May D. Azaula Danica Villaflor Louie Tamayo Reylen Maturingan Kuya Joseph