You are on page 1of 10

ETHICS IN

TECHNOLOGY
FRIDAY 22nd JANUARY 2016.
PENAL SECONDARY SCHOOL

DONE BY: Salma V. Hosein

P H Y S I C A L S E C U R I T Y I SS U E S

TODAYS OBJECTIVES
1. Discuss the importance data security.
2. Select at least three (3) physical safeguards.
3. Integrate physical data security methods in daily
practice.

Activity 1
Q: What would you do to protect your
data?
Take a couple minutes to think about the
question. You will be required to share your
responses after the allotted time.

Time to complete : 5 minutes

Recap
Q: What is Data & Information?
Data raw fact & figures, unprocessed.
Information processed data, meaningful.

Q: What is Data Integrity?


Definition:
This refers to the validity of data. Data is said
to have integrity if it is complete and accurate.

Data Integrity
Examples of ways this can be
compromised are:
Natural Events (e.g., floods,
earthquakes, and tornados)
Hardware Malfunctions.
Viruses
Inaccurate Data Entry
Accidental or Malicious Deletion or
Changing of Data

Data Security
Data Security - means protectingdata, such as a
database from:

Destructive Forces

Unwanted Actions of Unauthorized Users.

Data Security involves:


1. Physical Safeguards
2. Software Safeguards

Activity 2 - Lets discuss this video


Q: What were some things Larry did wrong?
Random groups will be required to present their answers.

A:

Allowed stranger into office by accompanying him.

Visitor did not sign at the security booth and follow companys
procedure.

Left important documents, keys, cash, computer, password lying


around and unsecure.

Lent stranger ID badge.

Physical Safeguards
The following safeguards would deal with the protection of both hardware
and software from accidental or malicious damage or destruction.

Allowing authorised personnel to access computer facilities.


Having monitoring systems, sensors & alarms.
Employing security guards.
Using lock & keys or keyless entry (e.g. biometrics, keypad etc.), burglar
proof etc.
Storing data in a fireproof safe, in another building or location by
creating multiple backups, using cloud computing (In the simplest
terms, cloud computing means storing and accessing data and programs
over the Internet instead of your computer's hard drive).
.

Activity 3
Walkthrough
Instructions:

In groups of three (3) walk around and


observe the lab and check off only Y
all the physical security issues that
you observe. This is to be done using
the physical security checklist
provided. At the end of the allotted
time the groups will present their
findings and make 3 recommendations
for further improvements.

THE END
THANK YOU !!

You might also like