data integrity and security. data integrity data that has a complete or whole structure a...

11
Data Integrity and Security

Upload: darren-shelton

Post on 23-Dec-2015

215 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed

Data Integrity and Security

Page 2: Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed

Data integrity

data that has a complete or whole structure

a condition in which data has not been altered or destroyed in an unauthorized manner

Page 3: Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed

Wiretapping

any interception of a telephone transmission by accessing the telephone signal itself

Page 4: Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed

Electronic eavesdropping

the use of an electronic transmitting or recording device to monitor conversations without the consent of the parties

Page 5: Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed

Who can legally monitor phone conversations?

Federal law enforcement officials may tap telephone lines only after showing "probable cause" of unlawful activity and obtaining a court order

must limit the surveillance to communications related to the unlawful activity and to a specific period of time, usually 30 days

Electronic Communications Privacy Act, 18 USC 2516

Page 6: Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed

How does a cordless phone communicate?

Cordless phones operate like mini-radio stations.

They send radio signals from the base unit to the handset and from the handset back to the base.

These signals can travel as far as a mile from the phone's location

Page 7: Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed

CELLULAR TELEPHONES

Cellular phones send radio signals to low-power transmitters located within "cells" that range from one block to 20 miles across

As you travel from cell to cell, the signal carrying your voice is transferred to the nearest transmitter

Page 8: Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed

Data encryption

the coding (scrambling), of the data before it is transmitted over the communication link

Decryption is the decoding (descrambling), of the received data.

Page 9: Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed

Algorithm

An algorithm is a set of instructions, in this case for scrambling the data

A key is a set of specific codes to be used by the algorithm to perform the encryption

Page 10: Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed

Protect yourself in data communications

Keep your system software and patches up to date

A personal firewall Keep your anti-virus software up to

date Turn off any services you don't need Least secure: Wireless

networking

Page 11: Data Integrity and Security. Data integrity  data that has a complete or whole structure  a condition in which data has not been altered or destroyed

Video