05.Computer_Security.pdf

(34 KB) Pobierz
Lock your device
Watch out for tricks
Free stuff usually isn't free
Keep the password secret
Keep the information locked away
Keep the computer up to date
Security
Good
Practice
Legal obligation to keep
sensitive data secure
Why be
secure?
Theft/loss of a device
Virus, worm, trojan
Competitive advantage
Prevent financial loss
Prevent reputation damage
Intentional
Spyware and adware
Phishing
Hackers
User error
Spillages (
of liquids
)
Proper back-up of
critical data is vital
Should be stored in a
different secure location
Always encrypted.
Updated on regular basis.
Computer
Security
Back Ups
Risks and
threats
Unintentional
Natural disasters
Risk analysis
: assessing the
chance of an asset being
lost/damaged, assessing its value
to the company and deciding how
much effort to expend on securing
that asset.
Physical Controls
Power cuts
Fires
Disaster Recovery Plan
Business Continuity Plan
Plan for restoration of
computing/ communication
services after a disruption
Proper back-ups
Alternate work spaces &
spare IT equipment
Contact lists
Well practise
evacuation plan
Security
Contingency
Controls
Plan
Risk mitigation
: implementing
controls that are likely to
reduce/eliminate the risk and
developing ways to recover the
asset if a breach occurs
Access Controls (authorisations etc)
Firewalls (prevent unauthorised users
from accessing networks)
Elements of the plan
Procedural Controls (rules and
guidelines for users)
Analysing risk vs reward
- what would
the thief want to steal? => Is what the
business needs to protect the most.
Organisational controls (clear lines of
responsibility)
Social Media Accounts Controls
Zgłoś jeśli naruszono regulamin