Page 275 - DCAP104_EXPOSURE_TO_COMPUTER_DISCPLINES
P. 275

Exposure to Computer Disciplines



                   Notes
                                   is one of the “appropriate security measures” that data controllers must consider. The more
                                   people who have access to personal data, the greater is the risk of unauthorised access or
                                   disclosure. These issues were discussed with the data controller in detail. The organisation
                                   explained that the wide availability of personnel information and staff operational details
                                   was due in part to business requirements, and in part to the culture and tradition of the
                                   organisation. Following discussions, the data controller made a number of significant changes
                                   to the computer system, at some expense, in order to restrict access to the personal data of
                                   employees. It is my view that, in a case such as this, an appropriate balance must be struck
                                   between the concerns of the employee as data subject, the real operational requirements of
                                   the organisation and the costs to the organisation. I took the view that, following the changes
                                   referred to above; the data controller was compliant with the Act.
                                   Questions:

                                   1. Why do the protecting privacy of a data over a communication channel is needed?
                                   2. Explain the process involved in data protection.

                                 14.9  Summary

                                    • Home computers are typically not very secure and are easy to break into, when combined
                                      with high-speed Internet connection that are always turned on, instruders can quickly find
                                      and then attack home computers.
                                    • Encrypt data means that you don’t want to see.
                                    • Internet Explorer manage your cookies by clicking on the tool menu.

                                    • A web bug is a graphics on a web or an email message that is designed to monitor who is
                                      reading the web page or email message.

                                    • In a good security policy, special emphasis should be given to protect all equipment handling
                                      or containing sensitive information.

                                 14.10  Keywords


                                 ARPA: Stand for the Advanced Research Projects Agency - that funded and managed the project.
                                 Cookies: An internet cookie is a packet of information sent by a server to a browser, which is then
                                 sent by the browser each time it accesses the server.
                                 Firewall: A firewall is a piece of software or hardware that sits between your computer and the
                                 internet and only allows certain types of things to cross the wall.
                                 ICO(Information Commissioner’s Office): It allows people to find out what information
                                 organizations are holding on them and what the information is being used for.
                                 Internet Explorer: In Internet Explorer, you can manage your cookies by clicking on the Tools
                                 menu, choosing Internet Options.
                                 Phishing: It is a way that internet scammers trick you into providing your personal and financial
                                 details. Phishing opens the door to identity theft, and more.
                                 Remote Procedure Calls (RPC): It is a vulnerabilities in RPC that allowed for one of the more
                                 recent worms to propagate.





        268                               LOVELY PROFESSIONAL UNIVERSITY
   270   271   272   273   274   275   276   277   278