Module 15 Protecting Information Flashcards
What does the Information Commissioner’s Office (ICO) enforce?
- Data Protection Act 2018
- the Freedom of Information Act 2000
- the Environmental Information Regulations 2004
- the Privacy and Electronic Communications Regulations 2003
- INSPIRE Regulations 2009
- the Re-use of Public Sector Information Regulations 2015.
What is the Scottish Information Commissioner’s Office resposible for?
- Freedom of Information (Scotland) Act 2002
- Environmental Information (Scotland) Regulations 2004
- Scotland also has complementary INSPIRE (Scotland) Regulations 2009
When did Britan leave the EU? When did the transition peiod end?
- Britain left - 1 January 2020
- Transition period until - 30 June 2020
Who does the DPA 2018 and GDPR apply to?
- any business or organisation which uses information for any business or “non-household purpose”
What constitutes personal data?
- name
- address
- other typically “personal” pieces of information
- IP address
How can organisations ensure that data is managed correctly?
- must have at least one Data Protection Officer within the business
Rights of EU citizens regarding their personal data?
- Access to data collected about them
- Ability and right to correct, erase, or block information
- Ability and right to object to all usages of data
- Ability and right to oppose automated decisions regarding them based on their data
- Judicial remedy and compensation
GDPR required that personal data be
- Processed in a manner that is fair and in accordance with all laws
- Collected and processed for a specific, clearly explained, legitimate purpose
- Recorded such that it is adequate, relevant and not excessive
- Recorded accurately
- Kept current
- Kept no longer than deemed necessary to fulfil the stated purpose
What happens if there is a data breach?
- £17 million or 4% of the company’s global turnover can be charged
- Must reveal if there has been a data leak, even if just one customer
- 72 hours following a breach to report this to ICO
Simple changes a business can implement to protect data?
- Passphrases not passwords - a pneumonic made up of letters from a phrase, lyric or sentence
- Lock all devices
- Access controls
- Update all software
- Personal/work information crossover
- Firewalls.
How can individuals protect their data?
- Anti-theft your devices
- Be careful when using a public WiFi
- Check web addresses for security
- Be careful what is shared on social media
- Turn off location settings
Denial of Service Attacks
- malicious attack on an organisation with the intent of restricting the operation of the server
- flood the communication ports
- prevent the receipt of legitimate messages
Virus Attacks
- piece of code that is loaded onto a computer without the knowledge
- can also replicate themselves
- can transmit themselves across networks and bypass security systems
- corrupt files on an infected computer
What should organistaions do to prevent virus attacks?
Virus software should:
- Be installed on every machine and run regularly
- Be updated often for new versions
- Scan all removable media before running applications
potential controls to prevent spam
- Email authentication solutions, for example, through digital signature recognition
- Policies and procedures that train staff to be vigilant as to whom they give their email addresses
What is a mutal aid pact?
- agreement between two or more businesses to share resources with one another in the case of a disaster
What is a cold site?
- business, or a group of businesses lease space in a building site or warehouse and design it to hold computer equipment
- site is separate to the head office
- equipment is not stored here
- site is ready and waiting for a disaster to happen
- should disaster happen allows hardware to be immediately moved to this cold site
What is a Hot site?
- Fully-functioning, fully equipped disaster recovery room
- also known as Recovery Operations Centre
Advantages of cloud computing?
- Recovery can be rapid with only local hardware lost.
- Business-criticalelectronic data is hosted remotely.
Advantages of mutaual aid pact?
- No additional cost
Advantages of a cold site?
- A reliable crate and ship vendor can make this easy to implement due to their experience
- Cheaper than a hot site
- More convenient than a mutual aid pact
Advantages of a hot site?
- ready to go if a disaster occurs
Disadvantages of cloud computing?
- Dependent on a thirdpartycloud computinghost server. This couldcreate risks regarding reliability of data storage and access
- No ability to recover hardware
Disadvantages of a mutual aid pact?
- Businesses must have available capacity to assist their partner
- Businesses must have compatible platforms
- The parties in the agreement must not be affected by the same disaster.
- Businesses must have a high level of trust in one another.
Disadvantages of a cold site?
- Costs more than a mutual aid pact
- Implementation can be slow
- Cold site space may not host all the parties who want to use it if there is a natural disaster or issue which affects multiple businesses
- The crate and ship vendor may have multiple customers so may not be reliable
Disadvantages of a hot site?
- Highest cost
- Needs to be continually serviced and maintained so it is ready should a disaster happen
- If a Recovery Operations Centre is used by multiple companies, it may not have room for all businesses should a natural disaster occur
Disaster Recovery Plans Dress Rehearsals
- Mutual Aid pacts can be tested, but only if all parties agree
- Cold and Hot sites can be tested; however, it can be costly