1 / 16

HRIS Security

Paul Dybas Deb Simon Rob Starace. HRIS Security. What is HRIS Security?. HRIS Security is the steps taken to ensure that employees personal data as well as the company’s data is kept safe. Utilization of HRIS technology Backup of system information Encryption of all data Human influence.

tova
Download Presentation

HRIS Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Paul Dybas Deb Simon Rob Starace HRIS Security

  2. What is HRIS Security? • HRIS Security is the steps taken to ensure that employees personal data as well as the company’s data is kept safe. • Utilization of HRIS technology • Backup of system information • Encryption of all data • Human influence

  3. Security Included in HRIS • Security features are included in HRIS systems • Separate employee access into levels • Customize access for each employee • Ex. switchboards Officer Access Front Line

  4. Example of HRIS Security System • Ability to change which people have access to certain information. • Who can see certain information? • Who can edit information?

  5. DATA BACKUP • Data backup consists of copying files and databases so that they can be recovered in the event of a system crash or failure

  6. Disasters Affecting Data

  7. CLOUD STORAGE DATA SERVER USER INTERNET

  8. 93% of companies that lost their data for 10 days or more filed for bankruptcy • 70% of business people have experienced data loss

  9. Types of Backup • Full and incremental first makes a full backup of your data and makes copies of all data changed since your last back up of any sort (full, incremental, or differential) • Differential backs up data that has been changed since the last full backup • Reverse delta stores the difference between current versions of a system and previous versions • Continuous data protection logs every change into the host system rather than scheduling backups periodically

  10. Encryption • Process of encoding information in such a way that only the person with the key can decode it • Simple example of encryption • http://www.youtube.com/watch?v=U5f0VkZVx-g • Two categories of encryption • Symmetric Key Encryption • Asymmetric Key Encryption

  11. Symmetric Key Encryption • Data Encrypted Standard (DES) was the first major symmetric algorithm • 56 bit key offering 70 quadrillion combinations • 70,000,000,000,000,000 • Advanced Encrypted Standard (AES) • 128 bit, 192 bit, or 256 bit keys • 300,000,000,000,000,000,000,000,000,000,000,000

  12. Asymmetric Key Encryption • Uses 2 keys at once • Private key • Public key • Keys are coded based on an infinite length of prime numbers • 1, 2, 3, 5, 7, 11 etc. • Example of Asymmetric Key Encryption • http://computer.howstuffworks.com/encryption3.htm

  13. Hash Value • The key in public key encryption is derived from something known as a hash value • Example • Use 128 bit numbers which has a possible 3,402,823,669,209,384,634,633,746,074,300,000,000,000,000,000,000,000,000,000,000,000,000 different combinations

  14. Authentication • Used to verify that information comes from a trusted source • Passwords, pass cards, digital signatures • Recently more technological forms of authentication have been applied to computer security due to the increased use of Biometrics • Fingerprint scans, retina scans, face scans, voice identification

  15. Human Factor • Humans themselves play a key role in keeping HR information safe. • Organization • When implementing HRIS, grant access to administrative data to trusted IT specialists only. • Personal • Be aware of surroundings • Keep passwords private

More Related