Computer and Data Security
Computer and Data Security
Security
and
Data Security
Data Security
• Data security is all about identifying and assessing
computer security risks.
• Computer security is any event action or situation-
intentional or not- that could lead to the loss of
computer systems and the data they contain.
Vulnerability Exposure to the possibility of being Computer system is connected to a Customer fills
attacked or harmed wide area network. It is also used to prescriptions at the
access their insurance company’s pharmacy and makes
extranet payments using
credit and debit cards
Threat A statement of an intention to inflict Data may be intercepted as it Credit card data and
damage transmitted from the pharmacy to the personal data may
insurance company be accessed by an
unauthorized person.
Attack Actual action that causes damage Credit card data stolen over a period Unauthorized
of weeks by an eavesdropper. purchases made with
credit card.
Countermeasu An action taken to prevent an attack Encrypt data before transmission. Use a credit or debit
re or minimize its effect card with chip- and-
pin technology.
Data Security
Data may become damaged, lost, stolen or have its integrity
breached through accidental or deliberate acts.
ACCIDENTAL DELIBERATE
Accidents Hacking
Fire
Environmental factors
Data Security
• Data may be misused or may lose its integrity in wide variety of
ways. Data may affect an individual, an organization or both.
Threat to data Individual Organizations
Credit Card fraud
Identity Theft
Violation of privacy
Storage of inaccurate information
Surveillance Computer fraud
Electronic eaves dropping
Industrial espionage
Propaganda
Software piracy
Cyberbullying
Copyright infringement
Data Theft
Denial of service attack
Transmission of virus and malware
Phishing attacks
Software and music piracy
Financial abuses
Credit Card fraud
• Credit card fraud occurs when criminals illegally
use someone else’s credit card details to obtain
goods or services. The increased popularity of
e-commerce to purchase goods and services
over the internet has led to an increase in credit
card fraud. The fraudsters use stolen credit card
details to obtain good using e-commerce
websites. Credit card fraud is very closely
related to identity theft.
Identity Theft
• Identity Theft is when criminals obtain and
use someone else’s personal detail to
impersonate them. As more personal data
is being stored on computers, computer-
related identity theft is increasing. They
can also do this by targeting garbage and
discarded material with personal
information on it.
Violation of privacy
• Privacy refers to an individual’s ability to
restrict or eliminate the collection, use and
sale of confidential personal information.
In many countries: it is illegal to store
personal information about individuals on
a computer without their explicit
permission.
Storage of inaccurate
information
• The storage of inaccurate personal data can have
serious impact on an individual. For example, if a person
is incorrectly recorded as having an outstanding debt
then that person will find it difficult to obtain a loan.
Inaccurate data can occur when:
– Incorrect data is entered into a system
– Data is accidentally changed or modified.
– People ,make what they think are valid changes but the changes
corrupt the data
Surveillance and Espionage
• Surveillance
• Surveillance is very common in the computing world. A
lot of surveillance happens without computer user
realizing that they are being monitored. Surveillance is a
computer fraud that involves electronically observing a
user’s activity on the computer; Criminals can install
special key logging software on computers that record
every key pressed.
•
• Industrial espionage
• This is when secret information is obtained by spying on
competitors or opponents.
Electronic eavesdropping
• Electronic eavesdropping is illegally
intercepting electronic messages as they
are being transmitted over a computer
network. Hackers track and use the data
people type into websites, such as login
details for bank accounts.
Propaganda
• Propaganda is information that is designed
to encourage you to think in a particular
way and hold a particular opinion. It may
include false information or it may give an
unbalance version of events. Computer
technology can be used to spread forms of
propaganda, with political ideals and belief
that are publicly announced or advertised.
Software Piracy
• Piracy is any act of taking or using someone else’s work without
their knowledge and permission. Software piracy is illegal.
Software piracy involves the following:
• Unauthorized copying or distribution of copyrighted software.
• Purchasing one single copy of software and installing it on multiple
computers.
• Copying, downloading, sharing, selling or installing multiple copies
onto personal or business computer is software theft.
• Copy Laws exist to protect the owners of proprietary software from
piracy and other abuses.
• The risk of downloading pirate software includes: Legal actions, viral
attacks and No technical support.
Cyber bullying
• Cyber bullying: the use of electronic
communication to bully a person, typically by
sending messages of an intimidating or
threatening nature. [Further explanation: is the
use of cell phones, instant messaging, e-mail,
chat rooms or social networking sites such as
Facebook and Twitter to harass, threaten or
intimidate someone. Cyberbullying is often
done by children, who have increasingly early
access to these technologies.]
Phishing
• Phishing is a cybercrime in which a target or
targets are contacted by email, telephone or text
message by someone posing as a legitimate
institution to lure individuals into providing
sensitive data such as personally identifiable
information, banking and credit card details, and
passwords.
• The information is then used to access
important accounts and can result in identity
theft and financial loss.
Copyright infringement
• Copyright infringement is the violation, piracy or
theft of a copyright holder's exclusive rights
through the unauthorized use of a copyrighted
material or wor.k.
• Under Jamaica’s Copyright Act 1993, copyright
applies to original literary, dramatic, musical or
artistic works, sound recordings, films,
broadcasts or cable programme, typographical
arrangements of published editions.
Denial of Service attack
• A denial-of-service (DoS) is any type of attack
where the attackers (hackers) attempt to prevent
legitimate users from accessing the service. DoS
attacks typically function by overwhelming or
flooding a targeted machine with requests until
normal traffic is unable to be processed,
resulting in denial-of-service to addition users. A
DoS attack is characterized by using a single
computer to launch the attack.
Definitions:
• Computer Security is concerned with
protecting hardware, software, and data
from unintentional, intentional or malicious
modification/destruction or from any type
of tampering, including unauthorized
access or disclosure of data.