0% found this document useful (0 votes)
9 views14 pages

s4 System and Data Security

Uploaded by

nsubugakreidah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views14 pages

s4 System and Data Security

Uploaded by

nsubugakreidah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Learning Outcomes:

The learner should be able to:

• Explain the concept of computer security. (k, u, v)

• Secure computer systems against attacks. (s, v)

• Describe ethical practices while using ICTs. (k, u)

SYSTEM AND DATA SECURITY

System security/ cyber security/computer security

System security refers to the measures and precautions implemented to

protect computer systems, networks, and data from unauthorized access,

attacks, damage, or disruptions.

System security is the protection of computer systems, data and information

from harm, theft and unauthorized access.

Key aspects in system security (goals of computer security)

The CIA triad is a fundamental concept that outlines three core principles to

achieve the overall security goals within a computing system. The CIA triad

stands for:

1. Confidentiality:

Definition: Confidentiality ensures that information is accessible only to

those who are authorized to access it. It involves protecting sensitive

data from unauthorized disclosure.


2. Integrity:

Definition: Integrity ensures the accuracy and reliability of data

throughout its lifecycle. It involves protecting data from unauthorized

modification, deletion, or tampering.

3. Availability:

Definition: Availability ensures that information and system resources

are accessible and usable by authorized users when needed. It involves

preventing and mitigating disruptions to services.

Computer Security risk

A computer security risk is any action or event that may cause harm to

computer hardware, software, data, or information.

Categories of computer security risks

Computer security risks are broadly categorized into;

1. Physical security risks

2. Data / information security risks

Physical security risks.

A computer physical security risk refers to a threat or potential danger to the

physical components of a computer system, network infrastructure, or related

hardware.

Some of the potential physical security risks include;


1. Hardware Theft:

• Description: this is stealing of computers, servers, or other

hardware components.

2. Hardware Vandalism:

• Description: this is the deliberate destruction of computer

equipment either by internal or external individuals.

3. Environmental Hazards:

• Description: Risks posed by environmental factors, such as floods,

earthquakes, or other natural disasters that can damage or

destroy computer equipment.

4. Power Failures or Fluctuations:

• Description: Risks related to power supply issues, including power

outages, surges, or fluctuations that can damage hardware

components or lead to data loss.

5. Fire Outbreaks:

• Description: Uncontrolled fires can pose a serious threat to the

physical infrastructure of computer systems, including servers,

data centers, and other hardware components.

Prevention of physical security threats/ risks.

Physical security risk Prevention measures

Hardware theft Use physical access controls such as locked

doors, windows, etc.


Use cables to lock equipment on desk e.g.

keyboard locks

Use alarm systems to warn in case of intrusion

Put bulgar proofing in windows

Hiring security guards

Hardware vandalism Monitoring using CCTV cameras

Limit access to equipment

Environmental hazards For cases of lightening, have a lightening

conductor

The computer laboratory should be on a raised

ground in case of floods.

Power failures Using uninterruptable power supply (UPS) to

provide power backup in case of outages.

Using surge protectors to protect computer

equipment in cases of electrical spikes

Using power stabilizers in case of voltage

fluctuations.

Fire outbreaks Having a fire extinguisher to put out any fires.


Data security risks

A computer data security risk refers to a threat or potential danger to the data

and information of a computer system.

Some of the potential data security risks include;

1. Viruses:

• Description: Viruses are malicious software programs that disrupt

the normal functioning of a computer.

• Categories of computer viruses

Worm: A worm is a type of computer virus that reproduces itself

continuously until it the computer runs out of memory.

Trojan horse: A Trojan horse is a deceptive type of malware that

disguises itself as a legitimate or beneficial program but actually

contains malicious code.

Boot sector virus: A boot sector virus infects the master boot

record (MBR) or the boot sector of a computer's hard drive or

removable storage.

Joke: A joke is a harmless program that displays annoying

messages on the screen.

• Sources of computer viruses

o Fake games, o freeware from the

o pirated software, internet,


o infected storage o infected software

devices, installers,

o rogue sites, o infected email

attachments

• Signs and symptoms of computer viruses

o Flickering of the o Reduction in

screen computer

o Un usual memory

messages on the o Reduction in

computer screen computer speed

o Programs taking o Missing computer

longer to open icons

o Corrupted files o Frequent system

o Failure to boot crashes

• Prevention of computer viruses

o Install an updated antivirus

o Scan all removeable devices

o Handle email attachments with caution

o Use a firewall

o Make regular data backups

o Avoid visiting rogue sites

2. Unauthorized Access:
• Description: Unauthorized access refers to individuals gaining

access to an organization's data, networks, endpoints,

applications or devices, without permission

3. Hacking:

• Description: Hacking involves gaining unauthorized access to

computer systems or networks with the intent to exploit

vulnerabilities, disrupt services, or steal data.

4. Cracking:

• Description: Cracking is the process of bypassing software

licensing restrictions to gain unauthorized access to software or

systems.

5. Phishing:

• Description: Phishing is a form of social engineering where

attackers use deceptive emails, messages, or websites to trick

individuals into providing sensitive information.

6. Eavesdropping:

• Description: Eavesdropping involves the unauthorized interception

and monitoring of communication, often over networks, to gain

access to sensitive information.

7. Electronic Fraud:
• Description: Electronic fraud includes various deceptive practices

conducted online to trick individuals or organizations into

providing money, sensitive information, or access credentials.

8. Spoofing:

• Description: Spoofing involves impersonating a trusted entity or

manipulating data to deceive individuals or systems.

9. Denial of Service Attack (DoS):

• Description: Denial of Service attacks overwhelm a system,

network, or service with excessive traffic, rendering it unavailable

to legitimate users.

10. Sabotage:

• Description: Sabotage involves intentional actions to disrupt,

damage, or destroy computer systems, networks, or data.

11. Backdoor Attacks:

• Description: Backdoor attacks involve creating secret access

points (backdoors) in systems, allowing unauthorized entry at a

later time.

12. Information theft

• Description: Information theft refers to the unauthorized and

intentional act of stealing or acquiring sensitive information from

individuals, organizations, or systems.


13. Software piracy

• Description: This is illegal duplication of copyrighted software.

Prevention of data security risks.

1. Passwords:

• Description: Passwords are a fundamental authentication method

where users must provide a unique combination of characters to

access a system or data. Strong, complex passwords enhance

security by making unauthorized access more difficult.

• Characteristics of a good password

(i) It should have a minimum of 8 characters

(ii) It should a mixture of different characters

(iii) It should expire (Always change your password)

(iv) It should easy to remember

(v) It should be about your personal information

Note: A username is a unique public identifier chosen by an individual to

represent their identity when accessing a system while A password is a

private string of characters (letters, numbers, and/or symbols) chosen

by a user to prove their identity when logging into an account or system.

2. Firewalls:

• Description: Firewalls are network security devices that monitor

and control incoming and outgoing network traffic based on


predetermined security rules. They act as a barrier between a

secure internal network and untrusted external networks,

preventing unauthorized access and protecting against cyber

threats.

3. Biometrics:

• Description: Biometrics involves using unique physical or

behavioral characteristics for user authentication. Common

biometric methods include fingerprint scans, retina or iris scans,

and facial recognition. Biometrics adds an extra layer of security

by relying on individual biological traits.

4. Antivirus:

• Description: Antivirus software is designed to detect, prevent, and

remove malicious software (malware) such as viruses, worms,

Trojans, and ransomware. It regularly scans systems for potential

threats and takes action to neutralize or quarantine them.

5. Data Backups:

• Description: Data backups involve creating duplicate copies of

important information to ensure its availability in the event of data

loss, corruption, or system failures. Regular backups provide a

means of restoring data to a previous state.

6. Access Rights:
• Description: Access rights, also known as permissions, define the

level of access and actions users or systems are allowed to

perform on data or within a system. Properly managing access

rights helps prevent unauthorized access and misuse of

information.

7. Audit Logs:

• Description: Audit logs record and store information about system

activities, user actions, and security events. Regularly reviewing

audit logs helps detect suspicious or unauthorized activities,

aiding in the identification and mitigation of security incidents.

8. Honey Pots:

• Description: Honey pots are decoy systems or networks designed

to attract and detect unauthorized access or cyber-attacks. By

diverting attackers to these intentionally vulnerable systems,

organizations can gather information about potential threats

without exposing critical infrastructure.

9. Intrusion Detection Systems (IDS):

• Description: IDS monitors network or system activities for signs of

malicious behavior or security policy violations. It detects and

alerts administrators about potential threats, enabling a swift

response to prevent or mitigate security incidents.

10. Data Encryption:


• Description: Data encryption involves converting data into a

coded form to protect it from unauthorized access during

transmission or storage. Encryption algorithms use keys to encode

and decode information, ensuring that only authorized parties can

decipher the encrypted data.

Cyber Crimes

Cybercrime, or computer crime, refers to criminal activities that are carried out

using computers, networks, and the internet.

Examples of common cybercrimes include;

• Hacking • Cyber • Cyber

• Phishing bullying extortion

• Electronic • Cyber

fraud Espionag

Intellectual property (IP)

Intellectual property (IP) refers to creations of the mind—ideas, inventions,

artistic works, designs, symbols, names, and images.

Intellectual Property Rights (IPR) are legal rights granted to individuals or

entities to protect their intellectual creations or inventions.

Protection of intellectual properties.

1. Patents:
• Patent rights provide inventors with exclusive rights to their

inventions, preventing others from making, using, selling, or

importing the patented invention without permission. Patents are

typically granted for a limited period, often 20 years.

2. Copyrights:

• Copyright grants creators’ exclusive rights to their original works

of authorship, including literary, artistic, musical, and dramatic

works. Copyright protection allows creators to control the

reproduction, distribution, public performance, and display of their

works.

3. Trademarks:

• Trademark rights protect distinctive signs, symbols, names, and

logos used to identify and distinguish goods or services.

Trademark owners have the exclusive right to use these marks in

commerce, preventing others from using similar marks that may

cause confusion.

ICT ETHICS

Ict ethics are moral guidelines that govern the use of computers.

Computer ethics involves the use of computers in a morally acceptable way.

Some of the most common computer ethics include;

o Contribute to society and human well being


o Always avoid harm of others

o Always be honest and trustworthy

o Always exercise fairness and don’t be discriminative

o Honor intellectual property rights

o Respect other individual’s privacy

o Honor confidentiality

Code of conduct

A code of conduct is a written guideline that determines whether a particular

action is ethical or unethical.

Sample code of conduct includes;

1. Computers shall not be used to harm other people

2. Users shall not interfere with another person’s work

3. Computers shall not be used to steal

4. Computers shall not be used to bear false witness

5. Users shall not copy software illegally

6. Users shall not use another individual’s computer without permission

7. A user shall consider the social impact of the programs they design

8. Users should use computers in a way that demonstrates consideration

and respect to other people.

You might also like