230 likes | 549 Views
Paul Dybas Deb Simon Rob Starace. HRIS Security. What is HRIS Security?. HRIS Security is the steps taken to ensure that employees personal data as well as the company’s data is kept safe. Utilization of HRIS technology Backup of system information Encryption of all data Human influence.
E N D
Paul Dybas Deb Simon Rob Starace HRIS Security
What is HRIS Security? • HRIS Security is the steps taken to ensure that employees personal data as well as the company’s data is kept safe. • Utilization of HRIS technology • Backup of system information • Encryption of all data • Human influence
Security Included in HRIS • Security features are included in HRIS systems • Separate employee access into levels • Customize access for each employee • Ex. switchboards Officer Access Front Line
Example of HRIS Security System • Ability to change which people have access to certain information. • Who can see certain information? • Who can edit information?
DATA BACKUP • Data backup consists of copying files and databases so that they can be recovered in the event of a system crash or failure
CLOUD STORAGE DATA SERVER USER INTERNET
93% of companies that lost their data for 10 days or more filed for bankruptcy • 70% of business people have experienced data loss
Types of Backup • Full and incremental first makes a full backup of your data and makes copies of all data changed since your last back up of any sort (full, incremental, or differential) • Differential backs up data that has been changed since the last full backup • Reverse delta stores the difference between current versions of a system and previous versions • Continuous data protection logs every change into the host system rather than scheduling backups periodically
Encryption • Process of encoding information in such a way that only the person with the key can decode it • Simple example of encryption • http://www.youtube.com/watch?v=U5f0VkZVx-g • Two categories of encryption • Symmetric Key Encryption • Asymmetric Key Encryption
Symmetric Key Encryption • Data Encrypted Standard (DES) was the first major symmetric algorithm • 56 bit key offering 70 quadrillion combinations • 70,000,000,000,000,000 • Advanced Encrypted Standard (AES) • 128 bit, 192 bit, or 256 bit keys • 300,000,000,000,000,000,000,000,000,000,000,000
Asymmetric Key Encryption • Uses 2 keys at once • Private key • Public key • Keys are coded based on an infinite length of prime numbers • 1, 2, 3, 5, 7, 11 etc. • Example of Asymmetric Key Encryption • http://computer.howstuffworks.com/encryption3.htm
Hash Value • The key in public key encryption is derived from something known as a hash value • Example • Use 128 bit numbers which has a possible 3,402,823,669,209,384,634,633,746,074,300,000,000,000,000,000,000,000,000,000,000,000,000 different combinations
Authentication • Used to verify that information comes from a trusted source • Passwords, pass cards, digital signatures • Recently more technological forms of authentication have been applied to computer security due to the increased use of Biometrics • Fingerprint scans, retina scans, face scans, voice identification
Human Factor • Humans themselves play a key role in keeping HR information safe. • Organization • When implementing HRIS, grant access to administrative data to trusted IT specialists only. • Personal • Be aware of surroundings • Keep passwords private