Techniques
Anti Virus software – Antivirus software is used to prevent, protect, detect and remove all types of programs and files which are malicious to the computer.
Firewall – A firewall is designed to block unauthorised access whilst permitting authorised communications and connections. It is a device/devices which is set to configure to permit, deny, encrypt, decrypt or proxy all incoming and out coming computer traffic between security domains depending in the set criteria and rules.
SSL – An SSL (Secure Sockets layer) is a cryptic protocol that provides security for communications for over networks.
Logon/ password – A logon password system is way to secure your computer system by using it when you start up your computer. However on the internet browser sites you need to make sure that you are putting your details into the right site otherwise your username and password may be stolen.
Security Assessor
IDS – IDS or Intrusion detection system is both a software and hardware which is designed to detect unwanted attempts at accessing, manipulating and or disabling the computer system through the internet or other similar networks. Attempts may take the form of malware or employees trying to hack the system however an IDS cannot detect an attack in a properly encrypted line of traffic.
Legal Constraints
Data protection act – An act which declares the protection of personal data. The key principles of the act include:
- Data may only be used for what the specified purpose is
- Personal data must not be kept for any longer than is necessary
- Personal data must be kept up to date
- Data must not be given to other people without the consent of the individual it is about, unless there is a legislation valid reason for some other valid reason
- Any factually incorrect information on the subjects should be corrected
Computer Misuse Act – This is an act that specifies that you may not
- Have unauthorised access to computer material
- Have unauthorised access with the intent of committing or making it easy to commit other crimes.
- Have unauthorised access to modification of computer material.
Copyright law -
Copyright law makes it so it’s illegal to perform the following acts without the consent of the owner
- Copy the work
- Rent, lend or sell copies of the work to the public
- Perform, broadcast or show copies of the work to the public
- Adapt the work and pass it off as your own
However acts that are allowed
- Using the material for private research and study
- Performance, copies or lending the material for educational purposes
- Criticism and news reporting of the material
- Copies of the material that is lent by the librarian
- Recording broadcasts to be viewed at a more convenient time
- Producing a backup copy of the material for personal use of the computer program