Lesson 4 - Data Security
Lesson 4 - Data Security
Lesson 4 - Data Security
Data security refers to protecting data from destructive forces and unwanted actions of
unauthorized users. Data needs to be protected from loss through accidental or malicious
deletion, virus attacks hard disk or system failures, unauthorized access etc.
This refers to the authorization you have to access different data files. Right of access helps
determines who has the right to do what in relation to certain data or information. For example,
database administrators may be able to remove, edit and add data while a general user may not
have the right to do the same. Right of access in an organization is usually given/ specified by
the system or database administrators.
iii) Logs and Audit trails:
An audit trail is a record showing who has accessed a computer system, when and what
operations he or she has performed during a given period of time. An audit trail can also
maintain a record of activity by the system itself. Audit trails are useful both for maintaining data
security and for recovering lost transactions.
v) Encryption:
This is the process of encoding (convert into a coded form) information stored on a device
especially where the data is stored on a portable device or transmitted over a public network. The
key to decrypt the data should be kept securely.
vi) Firewalls:
A firewall is a software or hardware-based network security system that prevents unauthorized
access to or from a private network. Such a system is very important where there is any external
connectivity, either to other networks or to the internet.
This includes locking of offices and use of alarms, keeping computers or database servers in
strong-rooms, use of security cameras and employing security guards where necessary.
The act contains eight data protection principles. The principles specify that personal data must
be:
i) Processed fairly and lawfully
HARDWARE SAFETY
Hardware safety protects the machine and peripheral hardware from theft and from electronic
intrusion and damage. Hardware safety can be ensured through:
Computers are very valuable and relatively portable they and can easily be stolen which would
be made worse by the loss of the valuable data stored on them. Physical safety should be put in
place such as locking the rooms, installing alarm systems and Closed Circuit Television Cameras
(CCTV) where they are kept to prevent theft. The computers can also be bolted to benches or
cabinets in order to make theft difficult.
The power delivered to computers should be stable and constant but sometimes fluctuations in
power supply occur. For example, voltage surges and spikes, a blackout or brownout can cause a
computer to shut down abruptly. Information that is stored only in short-term memory will be
lost. As well, the fluctuation can physically damage computer components such as the power
supply unit. Computer systems can be protected from such interruptions through:
A UPS is a device that allows a computer to keep running for at least a short time after the
primary power source is lost. The device also provides protection against power surges and
drops.
c) Environmental Safety
Computers also require the right balance of physical and environmental conditions to operate
properly. Measures should be put in place to protect computers from fire, smoke, dust, excessive
temperatures, high levels of humidity and electrical noise such as from motors. Such measures
include installation of climate control systems and dehumidifiers, fire fighting systems etc.
d) Other physical measures include the disabling of USB ports or CD ROM Drives,
installation of drive locks and case intrusion detection. This will help in protecting against
unauthorized copying and transfer of data as well as preventing infection of the computer
with viruses through portable storage devices such as pen drives.
SOFTWARE SAFETY
Logical/Software Safety consists of software safeguards for a system, including user
identification mechanisms and safety software. These measures ensure that only
authorized users are able to perform actions or access information in a network or a
workstation.
a) Biometric authentication
Biometric authentication is the use of a user’s physiological features to confirm their identity
before they are allowed access to a computer system. These features include software that verify
user identification through fingerprints, eye retinas and irises, voice patterns, facial bone
structure etc.
b) Token authentication
Token authentication comprises safety tokens which are small devices that authorized users of
computer systems or networks carry to assist in identifying them as they log into the system.
They include smart cards or small USB drives with built-in code generators and are inserted to
the computer through USB ports.
c) Password authentication
This method uses secret data e.g. strings of character to control access to a system and is
normally used together with usernames. The passwords are either created by the user or assigned
by system administrators.
d) Access Rights
e) Audit Trails
f) Use of Safety Software
Safety software refers to any computer program whose purpose is to help secure a computer
system or a computer network. Types of safety software include Antivirus software, Anti-key
loggers, Anti-Spam software, Firewall systems etc
o viruses
A virus is a malicious program that replicates itself and spreads from one
computer to another. They attach themselves to existing programs in order to
spread. Viruses almost always corrupt or modify files on a targeted computer.
o Trojan horses
o Worms
Worms are malware that spread themselves to other computers using computer
networks and do not need to attach themselves to existing software. They harm
networks by consuming bandwidth (by increasing network traffic etc) but do not
attempt to change the systems they pass through.
o Rootkits
A rootkit is a type of malicious software that is activated each time your system
boots up. Rootkits are difficult to detect because they are activated before the
Operating System has completely booted up. A rootkit often allows the
installation of hidden files, processes, hidden user accounts, and more in the
systems OS.
Keyloggers
This is a type of malware that records (or logs) the keys struck on a keyboard,
usually in a covert manner so that the person using the keyboard is unaware that
their actions are being monitored and then the information is transmitted to the
originators.
Anti-virus software include Norton, AVG, Kaspersky, MacAfee, Avast etc. These software
programs are meant to prevent, detect and remove malicious software from computer systems.
g) Firewalls
A firewall is software or hardware-based network safety system that controls the incoming and
outgoing network traffic by analyzing the data packets and determining whether they should be
allowed through or not, based on set rules.