Page 273 - DCAP104_EXPOSURE_TO_COMPUTER_DISCPLINES
P. 273
Exposure to Computer Disciplines
Notes It is important that access to critical system components such as the server is restricted to a small
number of individuals (usually the administrator and his backup). The server should be located
in a locked room to which access is restricted. Other considerations should include protection of
equipment against theft, fire, and electrical hazards.
No one must be able to remove a disk containing sensitive information or to install devices to
record confidential information. For this problem to be solved security policy must created to
maintain an environment secure enough to contain and keep the information handled by the
equipment safe from any damage or loss. See the section entitled “Controlling Access to your
PC” for a more in-depth look at dealing with access.
There are other specific items left to deal with in protecting computer data besides keeping data
from the eyes of unethical immoral people—that of machine failure. Computers crash—Especially
when you least want them to, like when you have a big project due or an important email that
needs to be responded to immediately—It seems that Murphy’s Law is the only law that holds any
sway when it comes to your computer’s hard drive—Unlike other issues discussed in this book,
there are no common sense approaches to keep it from happening, no programmers out there
hard at work trying to protect your computer from crashing—There aren’t even any hackers or
attackers to blame—The fact is that human beings are fallible and so are the things they make and
therefore, hard drives are not perfect—Just like you would never expect to drive a car without it
breaking down once in a while, so you should expect and learn to deal with crashing hard drives.
There are several very important things you can do to protect your hard drive, the most important
being: back up all your data regularly, keep your computer in a cool environment, make an
emergency bootable floppy disk, keep a fire extinguisher nearby, and keep programs to a minimum,
uninstalling those you don’t use, monitor and regulate the power supply and restrict authentication
and access to your computer(s). Keeping programs to a minimum: running multiple programs
also cause stress on your computer, decreasing your hard drive’s life span—Keep beta versions
and cracked software off your computer and if you don’t use a program anymore, uninstall it.
There are several other security implications that arise from the fact that computers run on
electricity. These include radio interference, which can be used for eavesdropping and sabotage,
plus radiation, a potential liability threat.
Employee Data - Appropriate Security Measures -
Disclosure
A
large organisation, whose staffs are employed at several locations throughout the
country, used a central database to record information relating to its employees and
their work. The complainant questioned the security arrangements in respect of his
personal data, and the extent of access to such data throughout the organisation.
The organisation’s computer system comprised about a hundred personal computers
nationwide connected to a central computer in the Dublin head office. Some sixty laptop
computers were also provided for use by employees when away from their offices. These
laptops contained a version of the organisation’s main database which was downloaded from
the main computer and updated periodically. Accordingly, data kept by the organisation on
its main database was available to staff in the head office, in the local offices, and at off-site
locations.
Contd...
266 LOVELY PROFESSIONAL UNIVERSITY