Page 275 - DCAP104_EXPOSURE_TO_COMPUTER_DISCPLINES
P. 275
Exposure to Computer Disciplines
Notes
is one of the “appropriate security measures” that data controllers must consider. The more
people who have access to personal data, the greater is the risk of unauthorised access or
disclosure. These issues were discussed with the data controller in detail. The organisation
explained that the wide availability of personnel information and staff operational details
was due in part to business requirements, and in part to the culture and tradition of the
organisation. Following discussions, the data controller made a number of significant changes
to the computer system, at some expense, in order to restrict access to the personal data of
employees. It is my view that, in a case such as this, an appropriate balance must be struck
between the concerns of the employee as data subject, the real operational requirements of
the organisation and the costs to the organisation. I took the view that, following the changes
referred to above; the data controller was compliant with the Act.
Questions:
1. Why do the protecting privacy of a data over a communication channel is needed?
2. Explain the process involved in data protection.
14.9 Summary
• Home computers are typically not very secure and are easy to break into, when combined
with high-speed Internet connection that are always turned on, instruders can quickly find
and then attack home computers.
• Encrypt data means that you don’t want to see.
• Internet Explorer manage your cookies by clicking on the tool menu.
• A web bug is a graphics on a web or an email message that is designed to monitor who is
reading the web page or email message.
• In a good security policy, special emphasis should be given to protect all equipment handling
or containing sensitive information.
14.10 Keywords
ARPA: Stand for the Advanced Research Projects Agency - that funded and managed the project.
Cookies: An internet cookie is a packet of information sent by a server to a browser, which is then
sent by the browser each time it accesses the server.
Firewall: A firewall is a piece of software or hardware that sits between your computer and the
internet and only allows certain types of things to cross the wall.
ICO(Information Commissioner’s Office): It allows people to find out what information
organizations are holding on them and what the information is being used for.
Internet Explorer: In Internet Explorer, you can manage your cookies by clicking on the Tools
menu, choosing Internet Options.
Phishing: It is a way that internet scammers trick you into providing your personal and financial
details. Phishing opens the door to identity theft, and more.
Remote Procedure Calls (RPC): It is a vulnerabilities in RPC that allowed for one of the more
recent worms to propagate.
268 LOVELY PROFESSIONAL UNIVERSITY