IT

IT

Popular Posts

Sunday, 27 October 2013

Protecting Files From Unauthorised Access



1.       What does unauthorised access mean?
Unauthorised access is where no-one has permission to access any files which are confidential or personal without consent.

2.      Give two examples of unauthorised access.
Two examples of unauthorised access are hackers going into your files in order to seek information which may be some use to them without authorised access. These can include: medical records, exam results, financial information, other employee’s wages, and so on.
                                                                                                                             
3.       What is meant by sensitive files?
Sensitive files are files which are confidential and contain personal information which you do not wish to share and have strictly unauthorised to them. These can be medical records for example, as people do not wish to publish personal information.

4.       Give two examples of this.
Two examples of sensitive files include:
Address, phone number, work number, salary, medical records, your will, job title, etc.

5.       The business: how can an organisation such as a school use the network login to make sure that only authorised users have access to sensitive files?
In order to make sure only authorised users have access to sensitive files, they use self registration. This is where if workers wish to have permission to an unauthorised file then they’d have to ask permission in order to do so. If they enter the file without consent then they’ll be given the title ‘hacker’.

6.      In business: which two groups of people might want to gain unauthorised access to sensitive files?
Workers who are lower down in the work industry who wishes to have more access to sensitive files compared to the manger and senior managers above them and other fellow employee’s that are in rival with the other workers will want to gain access so they can find information about the other’s salary and wages. There are hackers within the industry and those outside the organisation, and there is anonymous hackers who hack into the company’s account in order to prove that the company’s security is poor. Or even anonymous hackers from rival companies to find out the other company’s secrets on their successful business.

7.       What does a fire wall do?
A firewall decides what people can access your files and which files they can’t. If there is a file which is unrecognised and if you don’t know who an administer is, then the firewall blocks them from entering your sensitive files so no confidential information is exposed.
The levels of security depends on the setting you set it on, and stops applications from accessing your network without authorised permission and blocks threats from attacking the computer. The firewall stops unknown IP addresses and networks from accessing the company’s files. It stops traffic from the input to the output.

8.      What specific problems do banks have?    Describe a product which the banks can use to keep their files safe?
A bank can use firewall software in order to stop the lower down workers in the industry from accessing any information they don’t want them to see. This can be information such as, how much money the bank has in store, potential customers and their bank balance, salaries. Also hackers would want to access this information and perhaps even customers of the bank. Another major problem for banks is that people can use identity theft in order to get information about another client to access their banking balance and information. Using a firewall stops workers from accessing sensitive files and stops hackers from entering the network. When people do online banking them use an identity key to protect information and have security cameras at ATM’s to stop theft.

9.      You: how can you make sure that unauthorised people don’t see your files?
The first way you can protect your files from unauthorised access is to put a password on all your files so only you know the password and the internal or external hacker cannot connect to your network. Frequently update your software on your computer so you are less at risk of your files being exposed to attack from hackers. Hardware and software firewalls are also an option too. Hardware firewalls are usually a device connected to your network on your router so no-one can enter your network. Software firewalls are installed onto the computer and controls the amount of ingoing and outgoing data so no anonymous servers are allowed authorised access to your files. Nowadays it is becoming more common to download a security virus protector on any device they own, as it stops viruses, spy wares, Trojans and malware’s from damaging your files and computer data. For example, these can be:
·         AVG
·         Norton
·         McAfee
·         Kaspersky
·         Bullguard and so on.

                  Put a password on a document
On your Microsoft Word or Excel document, click on the ‘File’ tab on the top-left hand side of the document. Then go down to the ‘Info’ option and on the right there is an option which says ‘Permissions’. On this tab, click on ‘Encrypt with Password’.
You then decide on a password and confirm it and then officially have a password for that Excel or Word document. However, if you forget your password you cannot retrieve it or view your document again.


Write a memo to the staff of a school reminding them about the importance of keeping sensitive documents safe. 





 
To: All teaching staff
CC: Office manager
From: Annie Clark
Date: 12th October 2013
Subject:  Protecting files from unauthorised loss

Dear all teaching staff,
It has come to my attention that the files which the workers keep on their server are at high risk of internal and external hackers which are eager to find confidential information about the school’s finance records and salary information. We have to take action towards this and have come up with two strategies of how to do this. The first idea is to encrypt a password to all of your files and documents whether this be a PowerPoint, Excel, Publisher, or Word document; as demonstrated above. Another suggestion is t0 install a firewall on every server on the Knight Templar’s network so it picks up the incoming and outgoing traffic from the internet to the device and stops unknown servers from accessing sensitive files that are unauthorised.
Kind regards,
Annie Clark.








 



 

No comments:

Post a Comment