Professional Documents
Culture Documents
Introduction 2
Learning Targets 3
Boot Up 3
Check Up 11
Big Idea 14
Wrap Up 15
Bibliography 15
Glossary 15
1
GRADE 7/8
Contact Centers hold data like client information. These are vital information that need to be
protected and secured. A security breach could cause big damage if these data were accessed
without authorization. Therefore, it is a must that these data be protected and that systems
and equipment where these data are stored be maintained to the highest level of security.
2
Learning Targets
Boot Up
Loop a Word
Find all words that can be associated with computer and data security.
S S E C C A T O E B V I R U S
U B C O M P U T E R T L R H I
S S E C U R I T Y O O Y J L C
Y X H R H T M F A T A D G U E
S P H O T A K K Z S V T U Z D
T R E Q X P U K C A B U F Q Q
E X V L L S Y S T E M R S U C
M L I A M C I N O R T C E L E
H N K N Y A B Q J L M Q E K Q
E N C R Y P T I O N E F I T W
3
Learn about It!
Data is one of the most important assets of a contact center. It relies heavily on databases
containing client and transaction information. Using data has a very big impact in the
operations and success of a contact center. This makes it very important for contact centers to
take data security seriously.
Data security as part of the maintenance of computer systems and equipment in contact
centers should be done. This will prevent data from unauthorized, intentional or accidental
destruction, modification and disclosure.
● Data Masking is covering up or replacing specific areas of the data (e.g. using special
4
symbols like asterisks) to protect it from external or internal malicious personnel who
may potentially use the data. For example, the first digit of a credit card number will be
replaced with asterisks.
● Data Erasure is done when an information or data is not anymore active and needs to
be removed from the system. For example, if a client requests that his/her information
be removed from a mailing list, the details will be removed permanently.
5
● Data Resilience is creating backup copies of data. These back-ups will only be accessed
when there is a need for data recovery during times when data are accidentally erased
or corrupted.
● Identify what data you have and where you keep them.
● Train the staff in data security including an orientation of data privacy and security.
● Maintain a list of people with access to sensitive and confidential data. It is best to
create a system of data access and if better minimize the list.
● Implement a data risk assessment to identify potential danger to your organization’s
data like virus attacks, malwares or unauthorized access and breach.
● Install trustworthy malware and antivirus software and be sure to conduct regular
scans.
● Implement a system of regular backing up of files.
6
Try It!
Check the computer unit in your laboratory. Observe how data is stored. Record your
observations by answering the questions below:
Questions Answers
Backing up Files
Backing up of files is important especially when there is a security breach wherein data has
been intentionally damaged, deleted, or lost. Therefore, as a responsible computer user, you
need to apply a system to backup files when something goes wrong. Softwares can be
reinstalled but data can be lost forever due to machine breakdown, virus, power outage,
software upgrades. It can also be due to natural and manmade calamities such as fire,
earthquakes, and human error.
A back-up is a duplicate copy of a file, program, folder, or storage if the original is damaged,
7
corrupted or lost. The backup is used to restore data into its original location in the system.
There are two types of back up, namely: full backup, which is backing up everything on the
computer system. It includes data, programs and even the operating system while an
incremental backup is a backup of only those that have changed since the last backup.
The idea of backup is keeping all your data organized. This will help simplify the backup
process. The best way is to store data in a single location so when backing up, you do not have
to search for everything. It is also better to organized data and classify them in a single
location according to type, use or data of access or creation. This will help you choose which
to backup first in order of importance.
If your operating system provides a backup feature. It is best to set a regular incremental
backup maybe on a daily basis or a full backup at least monthly. If you are someone who
cannot get in the habit of backing up, this will be useful. You can also make use of software
packages for backing up.
Computer Virus
Computer Virus is a malicious program that replicates itself by copying and embedding
itself to another program. It is spread through other executable programs or documents like
emails. The purpose of virus varies from gaining administrative access and control to steal
sensitive data or just merely cause damage to the system.
8
● through removable storage devices such as flash drives
9
● File Infectors are attached with program files of which when the file is executed the
virus is also loaded causing damage to the computer. These virus types are usually
attached to emails.
10
● Remove the Internet connection to avoid the virus from spreading.
● Delete temporary files for this helps speed up the virus scan.
Try It!
Try running your antivirus software. Observe if there will be viruses or malwares that will be
detected. If there is, record in the table below your observation then research for the effect of
the virus found and the solution to clear the virus.
Check Up
11
another program.
7. These are difficult to identify since it changes into a different form whenever it
replicates.
8. They are attached with program files of which when the file is executed the virus
is also loaded causing damage to the computer.
9. It is unlike the direct action type gets installed in the computer which makes it
difficult to identify and even remove.
10. It is also known as a non-resident virus which means because it stays hidden in
the memory of the computer but not get installed but not affect the system’s
performance.
12
Plug and Play
Checking Data Security
You are the maintenance staff of your company. You need to backup files and scan the
computer unit for virus infections. Afterwards, you are to submit a maintenance report to
your manager by filling up the form below:
MAINTENANCE REPORT
Problems Found:
13
Your work will be checked using the rubrics below:
Clarity Statements are very Some statements are Most statements are
Student is able to clear and not clear and needed not clear and needed
prepare clear and understandable with minor revisions. major revisions.
understandable no revisions
report.
Big Idea
Data security is the goal of computer maintenance especially in contact centers because of the
amount of data handled by contact centers, data should always be protected from malicious
access, damage or loss.
14
Wrap Up
● Data security is the foremost goal in computer maintenance. If the system fails, all data
in it maybe damaged or lost.
● We can prevent virus from spreading by protecting our system first.
● The first step in solving virus issues is knowing when and how it strikes.
Bibliography
Website:
Comodo Antivirus. “What are Antivirus?”. Accessed February 2, 2018.
https://antivirus.comodo.com/cloud-antivirus.php
ComputerWeekly. “Six Essential processes for keeping data secure.” Accessed February 2,
2019. https://www.computerweekly.com/opinion/Six-essential-processes
-for-keeping-data-secure
Microfocus. “What is data security.” Accessed February 2, 2019.
https://www.microfocus.com/en-us/what-is/data-security
Glossary
Backing up is the process of keeping a duplicate copy of data or files for safekeeping
Data Security is protecting the data from alteration, damage or loss.
Viruses are computer programs that maliciously damages are computer.
15