Computer System Security and Data Protection
Computer System Security and Data Protection
Computer security is concerned with the protection of hardware, software, and data.
Causes:
❖ Aging of hardware
❖ Natural disasters such as fire, floods etc
❖ Electrical power problems; under voltage, over voltage and spike
Software security
1. Internet and network security risks
a) Computer virus: a potentially damaging computer program that affects, or infects a computer
negatively by altering the way the computer works without the user’s knowledge or
permission.
b) Worm: A program that copies itself repeatedly, using up resources and possibly shutting
down the computer/network.
c) Trojan horse: A program that hides within or looks like a legitimate program. It does not
replicate itself to other computers.
d) Spam Electronic junk mail or junk newsgroup postings. Some people define even more
generally as any unsolicited e-mail. Real spam generally e-mail advertising for some product
sent to a mailing list or newsgroup. In addition to wasting people’s time with unwanted email
spam also eat a lot of network bandwidth. Consequently, there many organizations, as well as
individuals who have taken it upon themselves to fight spam with a variety of techniques. But
because the internet is public, there is really little that can be done to prevent spam
1
e) Files become corrupted
f) Programs or files do not work
g) Unknown programs or files mysteriously appear
h) System properties change
i) Operating systems runs much slower than usual
Ways of Infection
The computer gets infected when the user:
a) Opens an infected file
b) Runs an infected program
c) Boots the computer with an infected removable media inserted in a drive or plugged in a port
d) Connects an unprotected computer to a network.
e) Opens infected email attachment.
Methods of Protection
There is no 100% safe method. But users can take the following precautions:
a) Do not start a computer with removable media inserted in the drive or plugged in the ports
b) Never open email attachment unless you are expecting the attachment and it is from a trusted
source.
c) Install an antivirus program and update it regularly. E.g. AVG, MAcFee, Norton anti-virus,
Symantec anti-virus
Methods of Eradication
a) Start a computer with a clean recovery disk, then scan and remove virus from a computer with
an up to date antivirus program
b) Reformat the hard disk. (If the above has failed)
c) Delete the virus form the register
Preventions
a) Write a use policy that outlines the computer activities for which the computer may not be
used for.
b) Use Access Controls: It is a security measure that defines who can access a computer, when
they can access it and what activities they can take while accessing it. Access controls have a
two phase process called Identification and Authentication.
❖ Identification verifies that an individual is a valid user
❖ Authentication verifies that the individual is the person he/she claims to be.
The three methods of access control are:
2
iii. Biometric devices
Biometric is the technology of authenticating a person’s identity by verifying a
personal characteristic such as your fingerprint.
Examples: fingerprint reader, voice verification system, iris recognition system
etc.
*Biometric devices are the best methods of access control because they cannot
be forgotten or misplaced are unique.
3. Software Theft
It occurs when someone:
a) Steals software media
b) Intentionally erases programs
c) Illegally copies a program
Software piracy is the unauthorized and illegal duplication of copyrighted software.
**Firewall is a hardware/software that protects a networks resource from intrusion by user on another network such
as internet.
Personal fire wall is a utility program that detects and protects a personal computer and its data from unauthorized
intrusions.
Firewalls are used to prevent unauthorized internet users from accessing private networks connected to the internet,
especially intranets.
Data security
Data security is steps or measures taken to ensure that data is secure from corruption, unauthorized access and
misuse.
3
Do not use obvious passwords e.g. access, pass, enter, go in, etc
III. Encryption
Encryption is the process of converting readable data into unreadable characters to prevent unauthorized
access.
Plaintext is unencrypted, readable data.
Ciphertext is encrypted (scrambled) data.
Decrypt is the process of converting encrypted data into plaintext.
Encryption key is a programmed formula that the recipient of the data uses to decrypt ciphertext.
Methods of encryption
a. Transposition: Switch the order of characters.
Example:
Plaintext Ciphertext Explanation
Software ostfawer Adjacent characters swapped
Computer Crime
Computer crime is illegal act involving a computer. Computer crime exists due to the growth of information
systems, the move away from cash transactions and the ease with which transactions now take place.
1. Hacking – is the breaking into a computer by connecting to it and then logging in as a legitimate user.
2. Use of computer time for non-company purposes – when an employee uses company resources for
personal gain.
3. Software theft/Software piracy – is the unauthorized and illegal duplication of copyrighted software.
And
4. Hardware theft – is the act of stealing computer equipment and destroying computer equipment.
5. Information theft – occurs when someone steals personal or confidential information.
6. Electronic fraud – is the use of computer or communication system to commit fraud for financial gain.
4
7. Credit card fraud
Back-up data
All micro-computers will suffer from at least one disk failure in their life time. It is therefore important to back-up
data
• A backup file is a copy of the original file which is kept in case anything happens to the original file then it
can be used to restore the data
o Can be kept on a floppy or a different hard disk
o Can be kept on a backup data tape
• Archive files are kept in long term storage in case they are required.
o Often from a back up data tape
• Back-up systems often use:
o Grandfather – Father – Son principal
Rules of back-up
i. Make two copies of back-up data on the hard disk
ii. Never keep back-up data near the computer
iii. Make two copies back-up data, one kept on site-in the office and another off site-outside the office.
iv. Most critical important data should be kept in a fire proof safe.
Data Security is concerned with keeping data from hazards that could destroy it.
e.g. viruses
5
DATA PROTECTION ACT
1. This act is based on the protection of personal data. The principle states that personal; data shall not be processed
until one of the following conditions are met:
• The owner of the information has given permission for the data to be processed
• The data controller has legal obligation to process the data
• The processing is necessary for the administration of justice or a gover5nment department.
2. Personal data shall be obtained for the specified or lawful purpose and can only be processed for the duty it has
been collected for.
3. Personal data shall be adequate, relevant and not excessive for the purpose it has been collected for.
4. Personal data shall not be kept for a period more than it was required for…
Restoring from
The backup software creates copies of all the incremental backups is the
files, or parts of files that have changed since slowest because it may
previous backups of any type (full, differential require several sets of data
This method is the fastest
or incremental). to fully restore all the data.
when creating a backup.
Incremental For example if you had a
Backup: For example if you did a full backup on Sunday. full backup and six
The least storage space is
An incremental backup made on Monday, would incremental backups. To
needed.
only contain files changed since Sunday, and an restore the data would
incremental backup on Tuesday, would only require you to process the
contain files changed since Monday, and so on. full backup and all six
incremental backups.