E N D
1. Protecting ICT Systems AS Module 1 10.3
Heathcote Ch. 11
2. Internal & external threats Data & programs are vulnerable to both deliberate and accidental damage, ranging from:
A floppy disk which becomes unusable
To hackers stealing millions from a major organisation
Internal threats:
Hardware failure
Faulty procedures
Natural disasters
Remote systems or laptops may be lost or not properly operated in terms of back-ups and regular maintenance
Dishonest employees
External threats
Hackers
Viruses
3. Measures to protect systems Physical restrictions
Login procedures – UserID and passwords
Levels of access
Audit software
Encryption
4. Types of backup Online backup
Often simultaneous update of 3 systems – one remote from the other 2
Periodic backups
Daily – stored off-site in a fireproof safe
Possible now to back up to internet providers
Backup of laptop data
Protects business in the event of loss or failure of machine
5. Other measures Virus checkers
Regular update of virus template is required to combat new viruses
Responsible companies do not allow downloads from internet or execution of attachments to e-mail
Careful vetting of staff
Comprehensive staff training
Considered siting of computer equipment to avoid basic disasters like flooding
6. Internet access issues Internet contains much unsuitable material
Schools must guard against:
Pupils accessing pornographic materials
Participation in chat rooms where pupils may be exposed to undesirable strangers
Business may want to control use of e-mail
Some organisations achieve this by installing and maintaining their own intranet (private internet)
They have a firewall to prevent unsuitable material being downloaded
This consists of a proxy server with special hardware and software to maintain security.