DATA SECURITY AND CONTROL
Introduction
Data & Information must be protected against unauthorized access, disclosure, modification or damage. This is because; it is a scarce & valuable resource for any business organization or government. It is mostly used in transactions, it can be shared, and has high value attached to it.
Data & Information security:
Data security is the protection of data & information from accidental or intentional disclosure to unauthorized persons.
Data & Information privacy:
Private data or information is that which belongs to an individual & must not be accessed by or disclosed to any other person, without direct permission from the owner.
Confidential data or information – this is data or information held by a government or organization about people. This data/information may be seen by authorized persons without the knowledge of the owner. However, it should not be used for commercial gain or any other unofficial purpose without the owner being informed.
Review Questions
(b) Recently, data and information security has become very important. Explain.
COMPUTER STUDIES FORM 1 NOTES FREE
Computer Studies Schemes of work term 1-3, Form 1-4
Computer Studies Notes Form 1, 2, 4 and 4- Free Download
COMPUTER STUDIES NOTES FORM 1-4
SECURITY THREATS TO DATA & INFORMATION
A virus is a computer code usually designed to carry out 2 tasks:
Types of computer viruses.
Types of destructions/damages caused by a virus attack
Sources of viruses.
If a diskette is used on a virus infected computer, it could become contaminated. If the same diskette is used on another computer, then the virus will spread.
Pirated software may be contaminated by a virus code or it may have been amended to perform some destructive functions which may affect your computer.
A virus could be introduced when the software is being developed in laboratories, and then copied onto diskettes containing the finished software product.
Some virus programs behave like games software. Since many people like playing games on computers, the virus can spread very fast.
Both freeware & shareware programs are commonly available in Bulletin board systems.
Such programs should first be used in controlled environment until it is clear that the program does not contain either a virus or a destructive code.
Viruses programs can be spread through software distributed via networks.
Symptoms of viruses in a computer system.
The following symptoms indicate the presence of a virus in your computer:
Control measures against viruses.
If they have to be used, they must be scanned for viruses.
Data & information is always under constant threat from people who may want to access it without permission. Such persons will usually have a bad intention, either to commit fraud, steal the information & destroy or corrupt the data.
Unauthorized access may take the following forms:
This is tapping into communication channels to get information, e.g., Hackers mainly use eavesdropping to obtain credit card numbers.
This is where a person may monitor all computer activities done by another person or people.
The information gathered may be used for different purposes, e.g., for spreading propaganda or sabotage.
Industrial espionage involves spying on a competitor so as to get or steal information that can be used to finish the competitor or for commercial gain.
The main aim of espionage is to get ideas on how to counter by developing similar approach or sabotage.
Control measures against unauthorized access.
Errors and accidental access to data & information may be as a result of:
Control measures against computer errors & accidents.
This is because; accidental access mistakes occur if the end-users have too much privilege that allows them to access or change sensitive files on the computer.
The threat of theft of data & information, hardware & software is real. Some information is so valuable such that business competitors or some governments can decide to pay somebody a fortune so as to steal the information for them to use.
Control measures against theft of information, hardware, & software.
Review Questions
(b) Give and explain two types of computer viruses.
(c) List three types of risks that computer viruses pose.
(d) List and explain five sources of computer viruses.
(e) Outline four symptoms of computer viruses.
(f) Explain the measures one would take to protect computers from virus attacks
COMPUTER CRIMES
Types of computer crimes.
The following are the major types of computer crimes:
Trespass.
Trespass is not allowed and should be discouraged.
Hacking.
Hacking is an attempt to invade the privacy of a system, either by tapping messages being transmitted along a public telephone line, or through breaking security codes & passwords to gain unauthorized entry to the system data and information files in a computer.
Reasons for hacking.
Hacking is done by skilled programmers referred to as Hackers. Hacker is a person who gains unauthorised access to a computer network for profit, criminal mischief, or personal gain.
Such people are able to break through passwords or find weak access points in software. They are involved in propagating computer viruses.
Tapping.
Tapping involves listening to a transmission line to gain a copy of the message being transmitted.
Tapping may take place through the following ways:
Cracking.
Cracking is the use of guesswork by a person trying to look for a weakness in the security codes of a software in order to get access to data & information.
These weak access points can only be sealed using sealed using special corrective programs called Patches, which are prepared by the manufacturing company.
A program patch is a software update that when incorporated in the current software makes it better.
NB: Cracking is usually done by people who have some idea of passwords or user names of the authorized staff.
Piracy.
Software, information & data are protected by copyright laws. Piracy means making illegal copies of copyrighted software, data, or information either for personal use or for re-sale.
Ways of reducing piracy:
Fraud.
Fraud is the use of computers to conceal information or cheat other people with the intention of gaining money or information.
Fraud may take the following forms:
Data input clerks can manipulate input transactions, e.g., they can create dummy (ghost) employees on the Salary file or a ghost supplier on the Purchases file.
E.g., a person created an intelligent program in the Tax department that could credit his account with cents from all the tax payers. He ended up becoming very rich before he was discovered.
Fraudsters can either be employees in the company or outsiders who are smart enough to defraud unsuspecting people.
Reasons that may lead to computer fraud.
Security measures to prevent fraud:
Sabotage.
Sabotage is the illegal or malicious destruction of the system, data or information by employees or other people with grudges with the aim of crippling service delivery or causing great loss to an organization.
Sabotage is usually carried out by discontented employees or those sent by competitors to cause harm to the organization.
The following are some acts of saboteurs which can result in great damage to the computer centres:
Alteration.
Alteration is the illegal changing of stored data & information without permission with the aim of gaining or misinforming the authorized users.
Alteration is usually done by those people who wish to hide the truth. It makes the data irrelevant and unreliable.
Alteration may take place through the following ways:
This is done by people with excellent programming skills. They do this out of malice or they may liaise with others for selfish gains.
This is normally done by authorized database users, e.g., one can adjust prices on Invoices, increase prices on selling products, etc, and then pocket the surplus amounts.
Security measures to prevent alteration:
Theft of computer time.
Employees may use the computers of an organization to do their own work, e.g., they may produce publications for selling using the computers of the company.
Theft of data (i.e., commercial espionage).
Employees steal sensitive information or copy packages and sell them to outsiders or competitors for profit.
This may lead to a leakage of important information, e.g., information on marketing strategies used by the organization, research information, or medical reports.
Review Questions
(b) State and explain various types of computer crimes.
DETECTION & PROTECTION AGAINST COMPUTER CRIMES
The following measures can be taken to detect & prevent computer crimes, and also seal security loopholes.
Audit trails
This is a careful study of an information system by experts in order to establish (or, find out) all the weaknesses in the system that could lead to security threats or act as weak access points for criminals.
An audit of the information system may seek to answer the following questions: –
Data encryption
Data being transmitted over a network faces the dangers of being tapped, listened to, or copied to unauthorized destinations.
To protect such data, it is mixed up into a form that only the sender & the receiver can be able to understand by reconstructing the original message from the mix. This is called Data encryption.
The flow diagram below shows how a message can be encrypted and decrypted to enhance security.
Cyphertext
Plain text Plain text
Encryption key Decryption key
The message to be encrypted is called the Plain text document. After encryption using a particular order (or, algorithm) called encryption key, it is sent as Cyphertext on the network.
After the recipient receives the message, he/she decrypts it using a reverse algorithm to the one used during encryption called decryption key to get the original plain text document.
This means that, without the decryption key, it is not possible to reconstruct the original message.
Log files
These are special system files that keep a record (log) of events on the use of the computers and resources of the information system.
Each user is usually assigned a username & password or account. The information system administrator can therefore easily track who accessed the system, when and what they did on the system. This information can help monitor & track people who are likely to violate system security policies.
Firewalls
A Firewall is a device or software system that filters the data & information exchanged between different networks by enforcing the access control policy of the host network.
A firewall monitors & controls access to or from protected networks. People (remote users) who do not have permission cannot access the network, and those within cannot access sites outside the network restricted by firewalls.
LAWS GOVERNING PROTECTION OF INFORMATION
Laws have been developed that govern the handling of data & information in order to ensure that there is ‘right of privacy’ for all people.
The following rules must be observed in order to keep within the law when working with data and information.
WEEKEND ASSIGNMENT 2015
FORM 3 AND 4
(b) Give and explain two types of computer viruses.
(c) List three types of risks that computer viruses pose.
(d) List and explain five sources of computer viruses.
(e) Outline four symptoms of computer viruses.
(f) Explain the measures one would take to protect computers from virus attacks
(b) Mention various threats to computer security.
GOOD LUCK
COMPUTER SECURITY
What is Computer security?
A computer system can only be claimed to be secure if precautions are taken to safeguard it against damage or threats such as accidents, errors & omissions.
The security measures to be undertaken by the organization should be able to protect:
Environmental threats to computers & Information systems.
Fire destroys data, information, software & hardware.
Security measures against fire:
This causes rusting of the metallic components of the computer.
Security measures against water, floods & moisture:
This causes power failure that can cause damage to data, which has not been transferred to permanent storage devices.
Security measures:
Excessive heat or temperature from the computer itself or from the surrounding environment can destroy computer storage media or devices.
Security measures:
A virus is a rogue software program that spreads rampantly through computer systems, destroying data or causing the system to break down.
Security measures against computer virus:
Dust and Smoke particles settle on storage devices and may scratch them during Read/write operation.
Security measures:
This includes activities such as:
Security measures:
People threats include:
Security measures against Carelessness & Clumsiness:
Security measures against Vandalism:
Review Questions
(b) Mention various threats to computer security.
CAUSES OF DATA LOSS IN COMPUTERS
Momentary interruptions or fluctuations of electrical power may cause:
The main cause of power disruptions are:
Precautions against data loss due to Power failure:
Frequent saving of documents ensures that minimum data is lost in case of any power failure.
Some application packages have an AutoSave feature, which should be activated to automatically save work after a specified time interval.
To eliminate any power quality defects or fluctuation, use power correction equipment such as a Stabilizer or Uninterruptible Power Supply (UPS). These equipments ensure a steady flow of input power to the computer system.
A computer virus destroys all the data files & programs in the computer memory by interfering with the normal processes of the operating system.
Precautions against computer viruses:
Use Antivirus software to detect & remove known viruses from infected files.
Some of the commonly used Antivirus software are: Dr. Solomon’s Toolkit, Norton Antivirus, AVG Antivirus, PC-Cillin, etc
NB: The best way to prevent virus is to have a memory-resident antivirus software, which will detect the virus before it can affect the system. This can be achieved by installing a GUARD program in the RAM every time the computer boots up. Once in the RAM, the antivirus software will automatically check diskettes inserted in the drives & warn the user immediately if a disk is found to have a virus.
Review Questions
(b) What are Anti-viruses? Explain how they detect and remove viruses.
Commands such as DELETE & FORMAT can be dangerous to the computer if used wrongly.
Both commands wipe out the information stored on the specified secondary storage media, e.g., formatting the Hard disk (drive C:) will destroy all the software on that system.
Precautions against Accidental erasure:
Use the Undelete facilities in case you accidentally delete your files.
There are two Undelete facilities depending on the operating system you are using.
To undelete at the DOS prompt, change to the drive & directory whose files were deleted, then type, e.g.,
C:\>UNDELETE <directory that contain the deleted file>
A list of all deleted files will be displayed with the first letter missing. Type in the first letter and the file will be recovered.
Norton utilities & PC Tools also have an undelete facility, which is similar to the DOS Undelete facility.
The Recycle Bin temporarily stores all deleted files & can be used to recover your files.
The Recycle Bin will restore all selected files to their original folders and disks.
NB: If you delete a file accidentally, don’t copy any files or install any applications to the disk that contains the deleted file. If you write anything to the disk, you might destroy parts of the deleted file, making it unrecoverable.
MS-DOS 6.0 has an Unformat facility which can be used to recover information stored on disks that have been accidentally formatted.
All data must be backed up periodically either on diskettes, tapes or CDs so that in case of any accidental loss, the backed up copy can be used to recover the data.
For small files, use the Copy command to make a copy of the data on a diskette. For larger amounts of data, use the Backup command to copy the data to several diskettes or to a tape drive.
Review Questions
When a hard disk crashes, the data or information on the disk cannot be accessed. The effect is the same as formatting the hard disk.
Crashing of a hard disk can occur due to the following reasons:
Precautions against crashing of Hard disks:
All data must be backed up regularly. In addition, all application programs & operating system software should also be kept safely so that in case of a complete system crash, everything can be re-installed/restored.
System tools such as Norton Utilities, PC Tools, QAPlus, etc can be used to revive a disk that has crashed.
Review Questions
Unauthorised access refers to access to data & information without permission.
Computer criminals can do the following harms:
Precautions against Unauthorised access:
Physical access to computer systems should be restricted to ensure that no unauthorised person gets access to the system.
Some of the ways of restricting physical access include:
Install a password to restrict access to the computer system.
A Password is a secret code that can be used to prevent unauthorised access of data in a computer.
Passwords can be put in at various levels:
When a valid password is entered, the user gets access to the computer system. Usually, the user is allowed three (3) attempts to get the password correct. If an invalid password is entered, access is denied after the 3 attempts.
Some computer security systems may generate an alarm if someone tries to use a fake password.
NB: You should never use passwords that can easily be linked to you, e.g., your name, birth date, or names of people close to you.
Review Questions
(b) What is a Password? Give its main importance.
Get the latest Mwalimu National Sacco BOSA Loans Application Form {Free Download}, here. PDF Latest…
Here is the revised and latest Mwalimu National Sacco FOSA Salary Advance Application Form {Free…
Here is the latest Mwalimu National Sacco FOSA Instant Loan Application Form {Free Download}. Download…
The landscape of digital gambling has shifted toward high-octane mechanics that prioritize volatility and massive…
The Teachers Service Commission (TSC) has advertised 170 job vacancies across, covering senior, mid‑level, and…
Health Cabinet Secretary Aden Duale has ordered immediate changes to the Social Health Authority (SHA)…