1 / 11

Data Integrity and Security

Data Integrity and Security. Data integrity. data that has a complete or whole structure a condition in which data has not been altered or destroyed in an unauthorized manner. Wiretapping. any interception of a telephone transmission by accessing the telephone signal itself.

len-harmon
Télécharger la présentation

Data Integrity and Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Data Integrity and Security

  2. Data integrity • data that has a complete or whole structure • a condition in which data has not been altered or destroyed in an unauthorized manner

  3. Wiretapping • any interception of a telephone transmission by accessing the telephone signal itself

  4. Electronic eavesdropping • the use of an electronic transmitting or recording device to monitor conversations without the consent of the parties

  5. Who can legally monitor phone conversations? • Federal law enforcement officials may tap telephone lines only after showing "probable cause" of unlawful activity and obtaining a court order • must limit the surveillance to communications related to the unlawful activity and to a specific period of time, usually 30 days • Electronic Communications Privacy Act, 18 USC 2516

  6. How does a cordless phone communicate? • Cordless phones operate like mini-radio stations. • They send radio signals from the base unit to the handset and from the handset back to the base. • These signals can travel as far as a mile from the phone's location

  7. CELLULAR TELEPHONES • Cellular phones send radio signals to low-power transmitters located within "cells" that range from one block to 20 miles across • As you travel from cell to cell, the signal carrying your voice is transferred to the nearest transmitter

  8. Data encryption • the coding (scrambling), of the data before it is transmitted over the communication link • Decryption is the decoding (descrambling), of the received data.

  9. Algorithm • An algorithm is a set of instructions, in this case for scrambling the data • A key is a set of specific codes to be used by the algorithm to perform the encryption

  10. Protect yourself in data communications • Keep your system software and patches up to date • A personal firewall • Keep your anti-virus software up to date • Turn off any services you don't need • Least secure: Wireless networking

  11. Video

More Related