TOPIC 5 - Data Security and Control
TOPIC 5 - Data Security and Control
CONTROL Introduction
Data security is the protection of data & information from accidental or intentional
disclosure to unauthorized persons.
Private data or information is that which belongs to an individual & must not be
accessed by or disclosed to any other person, without direct permission from the
owner.
- A computer virus is a destructive program that attaches itself to other files when
the files are opened for use, and installs itself on the computer, without the
knowledge of the user.
1. Boot sector viruses – they destroy the booting information on storage devices.
2. File viruses – they attach themselves to files either erasing or modifying them.
-Delete or modify data, information & files on storage devices (disks) or memory
during normal program execution, e.g., may attack the format of a disk making any
program or data on it impossible to recover.
- Can change keystroke values or data from other I/O devices, e.g., change the
effect of SHIFT key.
Sources of viruses.
d) Fake games:
Some virus programs behave like games software. Since many people like playing
games on computers, the virus can spread very fast.
Both freeware & shareware programs are commonly available in Bulletin board
systems.
Such programs should first be used in controlled environment until it is clear that
the program does not contain either a virus or a destructive code.
- Boot failure.
- Slow booting.
- Frequent
read/write errors.
Control measures against viruses.
i). Install up-to-date (or the latest) antivirus software on the computers.
ii). Restrict the movement of foreign storage media, e.g., diskettes in the computer
room.
v). Disable floppy disk drives, if there is no need to use disks in the course of
normal operation.
vii). Do not boot your computer from disks which you are not sure are
free from viruses. viii). Avoid pirated software. If possible, use the
ix). Programs downloaded from Bulletin Boards & those obtained from computer
clubs should be carefully evaluated & examined for any destructive code.
2). UNAUTHORIZED ACCESS
Data & information is always under constant threat from people who may want to
access it without permission. Such persons will usually have a bad intention, either
to commit fraud, steal the information & destroy or corrupt the data.
a). Eavesdropping:
This is where a person may monitor all computer activities done by another person
or people.
The information gathered may be used for different purposes, e.g., for spreading
propaganda or sabotage.
e). Strangers who may stray into the computer room when nobody is using the
computers.
f). Forced entry into the computer room through weak access points.
g). Network access in case the computers are networked & connected to the
external world.
Control measures against unauthorized access.
i). Enforce data & information access control policies on all employees to control
access to data.
ii). Keep the computer room closed when nobody is using it.
iii). Reinforce weak access points, e.g., doors & windows with metallic grills
& burglar alarms. iv). Use file passwords to prevent any person from getting
& information.
Errors and accidental access to data & information may be as a result of:
-Mistakes made by people, e.g., one may print sensitive reports & unsuspectingly
give them to unauthorized persons.
- People experimenting with features they are not familiar with. E.g., a person may
innocently download a file without knowing that it is self-installing or it may be
dangerous to the system.
This is because; accidental access mistakes occur if the end-users have too much
privilege that allows them to access or change sensitive files on the computer.
4). THEFT
The threat of theft of data & information, hardware & software is real. Some
information is so valuable such that business competitors or some governments can
decide to pay somebody a fortune so as to steal the information for them to use.
i). Create backups & store them in locations away from the main computing centre.
ii). Reinforce weak access points, e.g., the windows, doors, & roofing with
metallic grills and strong padlocks. iii). Put burglar proofs in the computer
room.
iv). Employ guards to keep watch over data & information centres and backups.
COMPUTER CRIMES
- The use of computer hardware, software, or data for illegal activities, e.g.,
stealing, forgery, defrauding, etc.
1. Trespass.
2. Hacking.
3. Tapping.
4. Cracking.
5. Piracy.
7. Sabotage.
8. Alteration of data.
9. Theft
of computer time / Theft of service.
Trespass.
Hacking.
- Asa hobby to test their expertise. Some people like the challenge & they feel
great after successful hacking.
-Some do it for computer & software producing companies that want to secure
their systems by reducing weaknesses discovered after professional hacking.
Such people are able to break through passwords or find weak access points in
software. They are involved in propagating computer viruses.
Tapping.
Cracking.
Cracking is the use of guesswork by a person trying to look for a weakness in the
security codes of a software in order to get access to data & information.
These weak access points can only be sealed using sealed using special corrective
programs called Patches, which are prepared by the manufacturing company.
A program patch is a software update that when incorporated in the current
software makes it better.
NB: Cracking is usually done by people who have some idea of passwords or user
names of the authorized staff.
Piracy.
Software, information & data are protected by copyright laws. Piracy means
making illegal copies of copyrighted software, data, or information either for
personal use or for re-sale.
Fraud.
Fraud is the use of computers to conceal information or cheat other people with the
intention of gaining money or information.
Data input clerks can manipulate input transactions, e.g., they can create dummy
(ghost) employees on the Salary file or a ghost supplier on the Purchases file.
b). Production & use of fake documents:
E.g., a person created an intelligent program in the Tax department that could
credit his account with cents from all the tax payers. He ended up becoming very
rich before he was discovered.