Shahare,
Sr.A.O./CF & Admn
WHAT IS THREAT TO COMPUTERS
Attack on confidentiality
Attack on authenticity
Software
Threats include deletion, alteration, damage
Backups of the most recent versions can maintain
high availability
Data
Involves files
integrity
33
• Data is a corporate asset, like any other
• Corporate data is at a higher risk of theft or
misuse than ever before
• Companies have obligations to protect data
– Laws, regulations, guidelines
– Contracts with third parties
– Privacy policies for users of websites, other online
features
34
Breaches of data privacy, data security can
result in
Damage to reputation
Disruption of operations
Legal liability under new and amended laws,
regulations, and guidelines, as well as under
contracts
Financial costs
35
Causes physical injury to the users due to
Prolonged mouse and keyboard use
37
• Data privacy laws govern businesses’
collection, use, and sharing of information
about individuals
• Federal, state, and foreign laws apply
• Laws govern both physical and electronic
security of information
38
Keeping marketers at Bay
1. Be wary about filling out forms.
45
• Best practices:
• Clear and concise
• Comprehensive
• Comprehensible
• Current
• Consistent with your actual practices
• Do not overpromise: “We will never
share your information . . .”
46
• Take stock
• What information do you have?
• Where is it stored?
• Who has access to it?
• Who should have access to it?
• Scale down
• Collect only what you need
• Keep it only as long as you need it
• Maintain a good filing system
• Restrict access
47
Most Web Browsers/Internet Explorers give
you option of refusing/accepting cookies.
Or requiring notification before allowing a
cookie to your PC
What is
Session Cookies : These are Transient cookies and
are temporary and are automatically deleted
when you close your browser.
Persistent cookies : These are stored cookies.
They are stored on your computer’s hard disk
until they expire or you delete them.
First-party cookies
These come from web sites you are currently viewing.
They are persistent cookies.