You are on page 1of 3

How is your information protected?

Username & password.


Firewalls
Pin numbers
Bio-metrics
Encryption
Swipe Card
What law means companies have to look after your personal data?
Data Protection Act.
What year?
1998
Principals of Data Protection Act
1. Personal data shall be processed fairly and lawfully and, in particular.
2. Personal data shall be obtained only for one or more specified and lawful purposes,
and shall not be further processed in any manner incompatible with that purpose
or those purposes.
3. Personal data shall be adequate, relevant and not excessive in relation to the
purpose or purposes for which they are processed.
4. Personal data shall be accurate and, where necessary, kept up to date.
5. Personal data processed for any purpose or purposes shall not be kept for longer
than is necessary for that purpose or those purposes.
6. Personal data shall be processed in accordance with the rights of data subjects
under this Act.
7. Appropriate technical and organisational measures shall be taken against
unauthorised or unlawful processing of personal data and against accidental loss
or destruction of, or damage to, personal data.
8. Personal data shall not be transferred to a country or territory outside the
European Economic Area unless that country or territory ensures an adequate level
of protection for the rights and freedoms of data subjects in relation to the
processing of personal data.

Encryption
Encryption is the most effective way to achieve data security. To read an encrypted file,
you must have access to a secret key or password that enables you to decrypt it.
Unencrypted data is called plain text. Encryption works by scrambling the original
message with a very large digital number (key). This is done using advanced
mathematics. Commercial-level encryption uses 128 bit key that is very, very hard to
crack. The computer receiving the message knows the digital key and so is able to work
out the original message. We should use encryption whenever processing credit card
details, processing transactions, online banking, sensitive documents, and private emails.
Biometrics
Biometrics is the science and technology of measuring and analysing biological data. In
information technology, biometrics refers to technologies that measure and analyse

human body characteristics, such as, DNA, fingerprints, eye retinas and irises, voice
patterns, facial patterns and hand measurements, for authentication purposes.

Advantages

Increase security - Provide a convenient and low-cost additional tier of security.


Reduce fraud by employing hard-to-forge technologies and materials. For
e.g.Minimise the opportunity for ID fraud, buddy
punching.
Eliminate problems caused by lost IDs or forgotten passwords by using
physiological attributes. For e.g. Prevent
unauthorised use of lost, stolen or
"borrowed" ID cards.
Reduce password administration costs.
Replace hard-to-remember passwords which may be shared or observed.
Integrate a wide range of biometric solutions and technologies, customer
applications and databases into a robust and
scalable control solution for
facility and network access
Make it possible, automatically, to know WHO did WHAT, WHERE and WHEN!
Offer significant cost savings or increasing ROI in areas such as Loss Prevention or
Time & Attendance.
Unequivocally link an individual to a transaction or event.

Disadvantages

Range of costs.

What is a username?
An identifier for an individual on a system that allows us to keep track of who they are
and what they are doing.
Why must a username be unique?
So that you can identify each individual on the system.
What is a password?
A sequence of characters that when we combine with the right username allows access
to the system.
What makes a strong password?

Random nothing to do with you


Numbers
Upper/Lower case letters
Symbols

List 4 ways of keeping a password save

Dont tell anyone your password

Dont write it down.


Change them regularly

Viruses

What is a virus?
A computer virus is a program or piece of code that is loaded onto your computer without
your knowledge and runs against your wishes. A virus self-replicates
How does a virus spread?
Computer viruses usually spread in one of three ways: from removable media e.g.,
memory sticks from downloads off the Internet; and from e-mail attachments.
What does a virus do?
A virus might corrupt/overwrite or delete data on your computer, use your email program
to spread itself to other computers, or even erase everything on your hard disk.
What is spyware?
Software that enables a user to obtain covert information about another's computer
activities by transmitting data covertly from their hard drive without you knowing.
How to prevent viruses

Install an antivirus program, which tries to detect a threat before its downloaded
on your computer.
Don't open email attachments unless you're expecting them.
Keep your computer updated.
Use a firewall.
Use your browser's privacy settings.
Use a pop-up blocker with your browser.
Turn on User Account Control (UAC).

You might also like