• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

The Importance of Data Security in ICT

Extracts from this document...

Introduction

The Importance of Data Security in ICT Data security is the process of preventing and detecting unauthorized use of your data and making sure that data is not accidentally misplaced or deleted. The security of the data saved on computers is important as many individuals, businesses and major companies rely greatly on their computer system. Information such as accounts and tax details, payroll and personnel files could be very difficult to replace and could cause significant problems for the company or person if the data is not secure. Violations of data security can lead to disclosure of personal data, forgery of personal identity, tampering of data and abuse of resources, with effects of real damage or financial loss. On a large scale, lost or stolen information can have a horrendous effect. The Government keeps important records and personal details of everyone in the country; if these are lost it can cause problems for a large number of individuals as well as members of the government. For example, a lack of data security caused the government to lose the names, addresses and bank details of over 25 million people stored on two CDs. If the personal details of these people were found by an untrustworthy individual it could lead to issues such as theft or identity theft, which could have devastating effects on individual people or society as a whole. ...read more.

Middle

Steps in protecting data need to be taken to ensure that the risks of these happening are minimal. To prevent these risks data needs to be protected against unauthorized access and use, modification or destruction. One possible way to take precautions against hacking is to use a firewall to inspect what goes into and out of your system, and deny or permit access according to a set of rules. Access can be permitted by the user, so if used insufficiently and allowing all programmes access to the computer system by default a firewall can become useless. Creating a password can also be an effective method of protecting information from unauthorised access. Ideally the password should consist of letters and numbers but be possible to memorize for the user, and kept secret to anyone except the user. Passwords should be changed regularly for information that is at a higher risk of unauthorised access. Alternatively data could be encrypted, so that information is made unreadable so that it is unintelligible until it is unscrambled by the intended recipient or made readable by the deciphering software. In addition, physical security such as data kept in a locked room or a room without windows on the ground floor, and with fire and flood proof walls. This makes it difficult to break in and steal equipment or information and prevents natural causes from destroying the information. ...read more.

Conclusion

The department shop Marks & Spencer breached this act when it allowed the details of 26,000 employees to be held on a laptop without protection of encryption. The laptop and the information was stolen, therefore the data is at risk of being misused. This could have been prevented if adequate security procedures were put in place to protect personal information before the personal information was allowed to leave the companies premises. A password and encryption of the data would be important measures to be taken to prevent these circumstances. Mobile operator service Orange has also been accused of breaching the Data Protection Act by way in which it processed personal information, in particular the way in which new members of staff were allowed to share usernames and passwords when accessing the company ICT system, and was also accused of not keeping its customers' personal information secure. If a company is not in compliance with the Data Protection Act when processing individual's personal information they may risk losing the trust of their customers as well as causing action to be taken by the Information Commissioners Office, which could result in prosecution. Security and protection of any data, whether personal details, or important company information, is essential in all circumstances to a varying degree. There are many processes that exist to prevent any violation to data, and ensure that individuals feel confident that their information is safeguarded by organisations. ?? ?? ?? ?? Sarah Johnson 11E ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE ICT Systems and Application section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related GCSE ICT Systems and Application essays

  1. The use of ict has changed the way in which people work. Explain the ...

    In 1974, The Police National Computer(P.N.C) came online to hold data about criminals. Computers have been used in the police force for many years in their fight to combat crime.The PNC serves all the police forces around the country and it is linked to police stations and mobile terminals in police patrol cars.

  2. ICT Report 2b: ICT in Organisations

    An advantage of the handheld reader over a stationary scanner is that large items which are hard to manoeuvre can be easily scanned by moving the reader to the barcode, rather than the barcode to the reader. Nowadays, handheld readers are usually wireless (instead of having a PS/2 or USB connection), and provide even more dexterity.

  1. The impact of ICT on a person with special/particular needs

    With all these things she can't do, TV is her escape. Sarah's main form of entertainment comes from television. It occupies her time and allows her to spend less time thinking or worrying about her problems. It's her leisure time and as Sarah cannot find much leisure elsewhere, it is very important in meeting the need to entertain Sarah.

  2. Report 3E: the Legislation that protects individuals and groups from the misuse of ICT

    However, Mr Chipcate can only keep this information for as long as he needs it, and after he's finished with it, (e.g. the wedding has finished) he needs to dispose of it in a safe manner, so that nobody else can find it.

  1. ICT Access

    with an easier process which the paper-based methods were unable to do. Mr. Hock intends me to produce the database as he lacks the IT ability and time, we have both decided Microsoft Access application would be best for the purpose and would influence the proposed audience.

  2. a level ict project

    Due to Victor's limited knowledge on computing functions, it wasn't until I introduced and explained the concept and advantages of Validation and Verification that Victor decided that this was a primary requirement. Mistakes by careless human error were common in the previous manual system, Validation and Verification will prevent these providing effective measures are positioned.

  1. I.C.T In Our Society

    A good thing about most email accounts is that they are free but then I get a lot of adverts and pop-ups. If email companies are going to give people free email then they need to get the money from somewhere to make sure they can afford the payment of

  2. How Organisations use ICT

    numbers and emergency contact information on that student needs to be found as quickly as possible and the staff don't have the time to be searching through paper files looking for that students information. Some of the information on each pupil is needed to be kept confidential, and because it

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work