SlideShare a Scribd company logo
1 of 24
Security
Procedures
Ten
Commandments
 of Computer
     ethics
10 Commandments of
 computer ethics


1. Thou shall not use a computer
   to harm other people
2. Thou shall not interfere with
   other people's computer work.
3. Thou shall not snoop around in
   other people's computer files.
4. Thou shall not use a computer
   to steal.
5. Thou shall not use a computer
   to bear false witness.
10 Commandments of
   computer ethics

6. Thou shall not copy or use proprietary
     software for which you have not paid.
7. Thou shall not use other people's
     computer resources without
     authorization or proper compensation.
8. Thou shall not appropriate other people's
     intellectual output.
9. Thou shall think about the social
     consequences of the program you are
     writing or the system you are designing.
10. Thou shall always use a computer in ways
     that ensure consideration and respect
     for your fellow humans.
The information used
  by an organization
usually originates in one
    of three ways. It
        includes;
1. Produced from data
   collected by the
   organization.
2. Produced from data
   collected by an outside
   source.
3. Purchased in a pre-
   processed format from
   an outside source.
Security
Procedure
Stages of       Procedures to secure                   Procedures to secure
 information    against accidental damage.                 against deliberate
  Processing.                                                  intrusion.
                •Electronic validation.                 •Password access to equipment
Data Entry      •On-screen reminders of security        and files.
                procedures.                             •Knowledge and verification of
                                                        source data.

                •Program testing.                       •Program testing
Processing      •Matching to template.                  •Matching run times; if a
                •Check digit in the binary code,        program takes longer than
                known as a ‘parity bit’.                expected it may have been
                                                        caused by an intrusion.
                •Random proofreading, as in             •Logging of every output
Information     newspaper                               attempt
   Output       •On-screen reminders about saving       •Password access to output
                files                                   devices.
                •Read only files where appropriate
Communication   •Clear, dated source identity           •Encryption of information
                •Verification of destination identify   •Logging destination addresses
                before transmission.                    •Logging the terminal address
                                                        used to communicate the info.
Protecting
    the
integrity of
    data
Protecting the integrity of data
    Methods of              Methods of         Method of securing the
   protecting the        guaranteeing the       information products
  integrity of data
                        software processes

Password access       Regular file matching    Password access to
to terminal           that guard against       editing functions.
                      hacker entry to a
                      system.
ID location badge     Virus detection          Read-only files where
for staff using       programs that run at     possible
cash register         critical events in the
                      program.
Biometric identify                             Encryption download
such as fingerprint                            with scan.
and iris scan
Security for
information
  received
Security for
information received
1. When ENTERING

2. While OPEN in their system

3. When EXITING
Security for
information
 produced.
Security for
information
 produced.
•Regular Back-ups
•File Access Restriction
Regular Back-Ups


 In organizations where staff
  are using computers at the
 desktop for a range of tasks
  during the day, autosave is
   only one part of back-up
  procedures used to secure
         information.
Additional Back-up
procedures includes;

1. screen messages instructing
   operators to back-up work on
   a floppy disk when a tasks is
   completed.

2. automatic log-out and save
   after 10 minutes of inactivity.
Additional Back-up
procedures includes;

3. saving and printing controlled
copies of files required for
proofing or by a reference group.

4. saving all files and folders on
the network to a tape, disk,
cartridge, etc. which is then
dated and locked in a secure
fireproof cupboard.
File Access
Restrictions
File Access
Restrictions

  Passwords are playing
    important role in
controlling the security of
information produced by
      organization.
File Access
  Restrictions

Features include:

• structure of hierarchy
• allocation
• duration
BOSS

     Staff                Financial            Stock
    Manager               Manager             Manager


           Staff
Rosters             Accounts     Payroll   Orders   Advertising
          Records
Security for
      information
     communicated
Information produced electronically by
an organization can be communicated via
range of media that includes;

               Cable
           Disk/CD-ROM
          Internet/e-mail
              Graphics
             microwave
Procedures to
protect information
communicated by an
   organization
• newspapers need classified
advertisements with correct
phone and price details.

• libraries need an up-to-date list
of all titles available to borrowers.
Thank You!

More Related Content

What's hot

Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
Sina Manavi
 
Internet security
Internet securityInternet security
Internet security
at1211
 
Cybersecurity in 2022
Cybersecurity in 2022Cybersecurity in 2022
Cybersecurity in 2022
Gabriel Schuyler
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
Ishwar Dayal
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
charlesgarrett
 

What's hot (20)

Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
 
Data encryption
Data encryptionData encryption
Data encryption
 
Internet of Things (IoT) - Introduction ppt
Internet of Things (IoT) - Introduction ppt Internet of Things (IoT) - Introduction ppt
Internet of Things (IoT) - Introduction ppt
 
Internet security
Internet securityInternet security
Internet security
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Cybersecurity in 2022
Cybersecurity in 2022Cybersecurity in 2022
Cybersecurity in 2022
 
06. System unit of computer
06. System unit of computer06. System unit of computer
06. System unit of computer
 
Introduction to Information Security
Introduction to Information Security Introduction to Information Security
Introduction to Information Security
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
File Encryption
File EncryptionFile Encryption
File Encryption
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Online Privacy and Security
Online Privacy and SecurityOnline Privacy and Security
Online Privacy and Security
 
Digital signatures
Digital signaturesDigital signatures
Digital signatures
 
Ethics in computing
Ethics in computingEthics in computing
Ethics in computing
 
Cyber Crime And Security
Cyber Crime And Security Cyber Crime And Security
Cyber Crime And Security
 
E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature E-Signature Vs. Digital Signature
E-Signature Vs. Digital Signature
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cybersecurity PowerPoint Presentation
Cybersecurity PowerPoint PresentationCybersecurity PowerPoint Presentation
Cybersecurity PowerPoint Presentation
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
Security policy
Security policySecurity policy
Security policy
 

Viewers also liked (8)

Security Procedures
Security ProceduresSecurity Procedures
Security Procedures
 
Rrc security procedure overview
Rrc security procedure overviewRrc security procedure overview
Rrc security procedure overview
 
IT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and ToolsIT Security Management -- People, Procedures and Tools
IT Security Management -- People, Procedures and Tools
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
 
Requirements and Security Assessment Procedure for C7 To Be PCI DSS Compliant
Requirements and Security Assessment Procedure for C7 To Be PCI DSS CompliantRequirements and Security Assessment Procedure for C7 To Be PCI DSS Compliant
Requirements and Security Assessment Procedure for C7 To Be PCI DSS Compliant
 
Chapter 4 health, safety and security procedures
Chapter 4 health, safety and security proceduresChapter 4 health, safety and security procedures
Chapter 4 health, safety and security procedures
 
Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...Reasonable security practices and procedures and sensitive personal data or i...
Reasonable security practices and procedures and sensitive personal data or i...
 
Security Management Practices
Security Management PracticesSecurity Management Practices
Security Management Practices
 

Similar to Security Procedures

2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
mrmwood
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
KnownId
 

Similar to Security Procedures (20)

Data/File Security & Control
Data/File Security & ControlData/File Security & Control
Data/File Security & Control
 
Security Requirements in eBusiness
Security Requirements in eBusinessSecurity Requirements in eBusiness
Security Requirements in eBusiness
 
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-112.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
 
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open SourceInvited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Source
 
css ppt.ppt
css ppt.pptcss ppt.ppt
css ppt.ppt
 
Chapter 15 incident handling
Chapter 15 incident handlingChapter 15 incident handling
Chapter 15 incident handling
 
Tietoturvallisuuden_kevatseminaari_2013_Jarno_Niemela
Tietoturvallisuuden_kevatseminaari_2013_Jarno_NiemelaTietoturvallisuuden_kevatseminaari_2013_Jarno_Niemela
Tietoturvallisuuden_kevatseminaari_2013_Jarno_Niemela
 
Computer Security Threats
Computer Security ThreatsComputer Security Threats
Computer Security Threats
 
ICT Security.pdf
ICT Security.pdfICT Security.pdf
ICT Security.pdf
 
Meeting the Cybersecurity Challenge
Meeting the Cybersecurity ChallengeMeeting the Cybersecurity Challenge
Meeting the Cybersecurity Challenge
 
11 Computer Privacy
11 Computer Privacy11 Computer Privacy
11 Computer Privacy
 
Presentation cyber forensics & ethical hacking
Presentation   cyber forensics & ethical hackingPresentation   cyber forensics & ethical hacking
Presentation cyber forensics & ethical hacking
 
Pci Req
Pci ReqPci Req
Pci Req
 
Botnets Attacks.pptx
Botnets Attacks.pptxBotnets Attacks.pptx
Botnets Attacks.pptx
 
Six steps for securing offshore development
Six steps for securing offshore developmentSix steps for securing offshore development
Six steps for securing offshore development
 
One of 2 protect your business
One of 2 protect your businessOne of 2 protect your business
One of 2 protect your business
 
Expand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and DataExpand Your Control of Access to IBM i Systems and Data
Expand Your Control of Access to IBM i Systems and Data
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
Cyber security
Cyber securityCyber security
Cyber security
 
Information Systems.pptx
Information Systems.pptxInformation Systems.pptx
Information Systems.pptx
 

More from markilyn

Degrees of data abstraction copy
Degrees of data abstraction   copyDegrees of data abstraction   copy
Degrees of data abstraction copy
markilyn
 
Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.
markilyn
 
Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.
markilyn
 
Database design challenges conflicting goals
Database design challenges conflicting goalsDatabase design challenges conflicting goals
Database design challenges conflicting goals
markilyn
 

More from markilyn (8)

Email (3)
Email (3)Email (3)
Email (3)
 
Dmbbb
DmbbbDmbbb
Dmbbb
 
Degrees of data abstraction copy
Degrees of data abstraction   copyDegrees of data abstraction   copy
Degrees of data abstraction copy
 
Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.
 
Database system environment ppt.
Database system environment ppt.Database system environment ppt.
Database system environment ppt.
 
Database design challenges conflicting goals
Database design challenges conflicting goalsDatabase design challenges conflicting goals
Database design challenges conflicting goals
 
Blogging report
Blogging reportBlogging report
Blogging report
 
Bibliographies
Bibliographies Bibliographies
Bibliographies
 

Recently uploaded

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Recently uploaded (20)

Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Agentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdfAgentic RAG What it is its types applications and implementation.pdf
Agentic RAG What it is its types applications and implementation.pdf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Designing for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at ComcastDesigning for Hardware Accessibility at Comcast
Designing for Hardware Accessibility at Comcast
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1UiPath Test Automation using UiPath Test Suite series, part 1
UiPath Test Automation using UiPath Test Suite series, part 1
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
THE BEST IPTV in GERMANY for 2024: IPTVreel
THE BEST IPTV in  GERMANY for 2024: IPTVreelTHE BEST IPTV in  GERMANY for 2024: IPTVreel
THE BEST IPTV in GERMANY for 2024: IPTVreel
 

Security Procedures

  • 3. 10 Commandments of computer ethics 1. Thou shall not use a computer to harm other people 2. Thou shall not interfere with other people's computer work. 3. Thou shall not snoop around in other people's computer files. 4. Thou shall not use a computer to steal. 5. Thou shall not use a computer to bear false witness.
  • 4. 10 Commandments of computer ethics 6. Thou shall not copy or use proprietary software for which you have not paid. 7. Thou shall not use other people's computer resources without authorization or proper compensation. 8. Thou shall not appropriate other people's intellectual output. 9. Thou shall think about the social consequences of the program you are writing or the system you are designing. 10. Thou shall always use a computer in ways that ensure consideration and respect for your fellow humans.
  • 5. The information used by an organization usually originates in one of three ways. It includes;
  • 6. 1. Produced from data collected by the organization. 2. Produced from data collected by an outside source. 3. Purchased in a pre- processed format from an outside source.
  • 8. Stages of Procedures to secure Procedures to secure information against accidental damage. against deliberate Processing. intrusion. •Electronic validation. •Password access to equipment Data Entry •On-screen reminders of security and files. procedures. •Knowledge and verification of source data. •Program testing. •Program testing Processing •Matching to template. •Matching run times; if a •Check digit in the binary code, program takes longer than known as a ‘parity bit’. expected it may have been caused by an intrusion. •Random proofreading, as in •Logging of every output Information newspaper attempt Output •On-screen reminders about saving •Password access to output files devices. •Read only files where appropriate Communication •Clear, dated source identity •Encryption of information •Verification of destination identify •Logging destination addresses before transmission. •Logging the terminal address used to communicate the info.
  • 9. Protecting the integrity of data
  • 10. Protecting the integrity of data Methods of Methods of Method of securing the protecting the guaranteeing the information products integrity of data software processes Password access Regular file matching Password access to to terminal that guard against editing functions. hacker entry to a system. ID location badge Virus detection Read-only files where for staff using programs that run at possible cash register critical events in the program. Biometric identify Encryption download such as fingerprint with scan. and iris scan
  • 12. Security for information received 1. When ENTERING 2. While OPEN in their system 3. When EXITING
  • 14. Security for information produced. •Regular Back-ups •File Access Restriction
  • 15. Regular Back-Ups In organizations where staff are using computers at the desktop for a range of tasks during the day, autosave is only one part of back-up procedures used to secure information.
  • 16. Additional Back-up procedures includes; 1. screen messages instructing operators to back-up work on a floppy disk when a tasks is completed. 2. automatic log-out and save after 10 minutes of inactivity.
  • 17. Additional Back-up procedures includes; 3. saving and printing controlled copies of files required for proofing or by a reference group. 4. saving all files and folders on the network to a tape, disk, cartridge, etc. which is then dated and locked in a secure fireproof cupboard.
  • 19. File Access Restrictions Passwords are playing important role in controlling the security of information produced by organization.
  • 20. File Access Restrictions Features include: • structure of hierarchy • allocation • duration
  • 21. BOSS Staff Financial Stock Manager Manager Manager Staff Rosters Accounts Payroll Orders Advertising Records
  • 22. Security for information communicated Information produced electronically by an organization can be communicated via range of media that includes; Cable Disk/CD-ROM Internet/e-mail Graphics microwave
  • 23. Procedures to protect information communicated by an organization • newspapers need classified advertisements with correct phone and price details. • libraries need an up-to-date list of all titles available to borrowers.