DATA SECURITY Data security refers to both physical protection of data and the controlled access of...

21
DATA SECURITY Data security refers to both physical protection of data and the controlled access of information The person who has good knowledge can steal the data, the person is called HACKER Type of threats to Data Security 1. Data not available to authorized personal at the required time: Threat due to faulty system or virus infections Preventive Measure: i. check the system and confirm whether it is faulty ii. If data is infected by virus, the virus protection measure must be taken 2. Data becoming available to unauthorized personal : The data stolen by the Hackers Kinley's Lesson Notes for Class X- 2010 1

Transcript of DATA SECURITY Data security refers to both physical protection of data and the controlled access of...

Page 1: DATA SECURITY Data security refers to both physical protection of data and the controlled access of information The person who has good knowledge can steal.

DATA SECURITYData security refers to both physical protection of

data and the controlled access of information

The person who has good knowledge can steal the data, the person is called HACKER

Type of threats to Data Security1. Data not available to authorized personal at the

required time: Threat due to faulty system or virus infections

Preventive Measure: i. check the system and confirm whether it is faultyii. If data is infected by virus, the virus protection measure must be taken

2. Data becoming available to unauthorized personal : The data stolen by the Hackers

Kinley's Lesson Notes for Class X- 2010 1

Page 2: DATA SECURITY Data security refers to both physical protection of data and the controlled access of information The person who has good knowledge can steal.

Preventive Measure:

a. Identification : Authorized users are given an identity code called User id code to access the data

b. Authentication : The verification of a user’s identity by passwords.

c. Authorization: Determining how an authenticated user is permitted to use data.

Kinley's Lesson Notes for Class X- 2010 2

Page 3: DATA SECURITY Data security refers to both physical protection of data and the controlled access of information The person who has good knowledge can steal.

Cryptographic SecurityThe translation of data into secret codes to safe

guard or protect the data during transmission

Uses:To provide data confidentiality ( authentification

and authorization fail )

Encryption : process that translate data to secret code to protect it from intended user.

Decryption : process that translate encrypted data to plain text

Kinley's Lesson Notes for Class X- 2010 3

Page 4: DATA SECURITY Data security refers to both physical protection of data and the controlled access of information The person who has good knowledge can steal.

Encryption Process

DECRYPTION

Algorithm

ENCRYPTION

DATA (Plain Text)

SECRET CODE(Cipher Text)

Tran

sm

issio

n

Algorithm

DATA (Plain Text)

SECRET CODE(Cipher Text)

Kinley's Lesson Notes for Class X- 2010 4

Page 5: DATA SECURITY Data security refers to both physical protection of data and the controlled access of information The person who has good knowledge can steal.

Computer Virus

Kinley's Lesson Notes for Class X- 2010 5

Page 6: DATA SECURITY Data security refers to both physical protection of data and the controlled access of information The person who has good knowledge can steal.

Computer VirusWhat is Computer virus?

A program written to alter the way a computer operates, without permission or knowledge of the user

The Criteria to consider as Virus:i). It must be execute itselfii). It must replicate itself

Kinley's Lesson Notes for Class X- 2010 6

Page 7: DATA SECURITY Data security refers to both physical protection of data and the controlled access of information The person who has good knowledge can steal.

Classification of Virus

File Infector VirusesBoot Sector VirusesMaster Boot Record VirusesMulti-partite virusesMacro Viruses

Kinley's Lesson Notes for Class X- 2010 7

Page 8: DATA SECURITY Data security refers to both physical protection of data and the controlled access of information The person who has good knowledge can steal.

1. File Infector VirusesInfect the program files which have

executable code such as .com and .exe files

It infect other files in the computer when infected program is run from floppy, hard drive or from the networks.

Example: Jersulum, Zigzag, Yankee 46, Friday the

13th

Kinley's Lesson Notes for Class X- 2010 8

Page 9: DATA SECURITY Data security refers to both physical protection of data and the controlled access of information The person who has good knowledge can steal.

2. Boot Sector Viruses

It infect the system area of the disk (boot record on floppy disks and hard disks)

All floppy disks and hard disks contains small program in the boot record that run when the computer is start up. Boot sector viruses attach themselves to this part of the disk and activate when the user attempts to start up from the infected disk.

These virus are memory residentExample:

airCorp, Aragon

Kinley's Lesson Notes for Class X- 2010 9

Page 10: DATA SECURITY Data security refers to both physical protection of data and the controlled access of information The person who has good knowledge can steal.

3. Master Boot Record Viruses

Memory resident virus which infect the disk same as Boot Sector viruses (where viral code is located).

It save a legitimate (genuine) copy of the master boot record in a different location

Example:

AntiExe, NyB, Unashamed

Kinley's Lesson Notes for Class X- 2010 10

Page 11: DATA SECURITY Data security refers to both physical protection of data and the controlled access of information The person who has good knowledge can steal.

4. Multi-partite viruses (polypartite)

It infect both boot records and program file

Once infected, it is difficult to repair

Example:

One-Half, anthrax, Tequilla

Kinley's Lesson Notes for Class X- 2010 11

Page 12: DATA SECURITY Data security refers to both physical protection of data and the controlled access of information The person who has good knowledge can steal.

5. Macro Viruses

It infect data files and other files (advent of Visual Basic in Microsoft’s Office 97) especially Microsoft Office Word, Excel, PowerPoint and Access files

Example:

W97M, Cakes, XM, Yohimbe

Kinley's Lesson Notes for Class X- 2010 12

Page 13: DATA SECURITY Data security refers to both physical protection of data and the controlled access of information The person who has good knowledge can steal.

Trojan HorseProgram that infect files but does not

replicate itself

Contains malicious code when triggered cause loss of data

Example:PWSteal, Trojan

Kinley's Lesson Notes for Class X- 2010 13

Page 14: DATA SECURITY Data security refers to both physical protection of data and the controlled access of information The person who has good knowledge can steal.

Worm

Program that replicate itself from system to system without the user of host file.

Kinley's Lesson Notes for Class X- 2010 14

Page 15: DATA SECURITY Data security refers to both physical protection of data and the controlled access of information The person who has good knowledge can steal.

Anti-virus SoftwareIt scan the programs, detect viruses and remove

them

Example of Anti-Virus Software are:

McAffee, SmartDog, Norton Antivirus, Avast, Quick Heal, AVG, Avira Antivir, Spy Doctor, etc

Kinley's Lesson Notes for Class X- 2010 15

Page 16: DATA SECURITY Data security refers to both physical protection of data and the controlled access of information The person who has good knowledge can steal.

Prevention of VirusThe precautionary measure are:1. The use of pirated software should be stop2. Write protect tags should be used on the original

software diskettes.3. Proper back up of all data and program files should

be kept4. Used floppies should be reformatted5. Avoid letting the system to be used by unauthorized

users6. Restrict the use of outside floppies/CD/Thumb drives7. Do not leave a floppy disk in the floppy disk drive

when you shut or restart the computer.8. Do not set your e-mail program to auto run

attachment9. Obtain all Microsoft security updates10. Use computer virus scanning program

Kinley's Lesson Notes for Class X- 2010 16

Page 17: DATA SECURITY Data security refers to both physical protection of data and the controlled access of information The person who has good knowledge can steal.

The CureThe viruses are omnipotent. Viruses can be cured

with anti-viral programs. The anti-viral programs perform one or more of the following functions:

Prevention: Check the system and stop the virus from infecting

Detection: It detect the virus infected files in the systemVaccination: Inject some code into the executable files and

check on the program being executed and warns if any changes have been made

Inoculation : Insert the virus signature into the infected areas and perform self detection and does not infected already infected files

Identification : Identify the types of virus infected in the systems

Damage control : It helps to control the systems/ program from getting damageKinley's Lesson Notes for Class X- 2010 17

Page 18: DATA SECURITY Data security refers to both physical protection of data and the controlled access of information The person who has good knowledge can steal.

Health IssuesRSI (Repetitive Strain Injury)-occurs from repeated physical

movements doing damage to tendons, nerves, muscles and other soft tissues.

How to prevent RSI?

1. Correct typing technique and posture- wrist should not rest on anything while typing and rest your hands on the lap or side instead of leaving on the key board.

2. The right equipment set up- key boards and chair are set at thigh and forearms level and wrist are straight.

Ergonomics – Mismatch between the physical capacity of workers and the demands of job (Musculoskeletal Disorder [MSDs])

Kinley's Lesson Notes for Class X- 2010 18

Page 19: DATA SECURITY Data security refers to both physical protection of data and the controlled access of information The person who has good knowledge can steal.

Copy Right

It confirms the validly of copyrights attaching to consumer products

Authentication Feature : halogram, watermark certification symbol code, image, sequence of numbers or letters

Software PiracyMaking illegal copies of software and distributing them in original packagesKinley's Lesson Notes for Class X- 2010 19

Page 20: DATA SECURITY Data security refers to both physical protection of data and the controlled access of information The person who has good knowledge can steal.

Types of Piracy:End User Piracy: copying software without buying

the appropriate number of licensesHard Disk Loading: practice of installing

unauthorized copies of software onto computer hardware prior to scale ( Computer illegally install software to sell machines)

Internet Piracy: copyright material illegally distributed through the internet (online)

Bootlegging: illegally making and distributing copies of software commonly in the form of backup, CD-R etc.

Counterfeiting: illegally making of copies and distributing copies in packages made to appears as original.

Kinley's Lesson Notes for Class X- 2010 20

Page 21: DATA SECURITY Data security refers to both physical protection of data and the controlled access of information The person who has good knowledge can steal.

Consequences of Software Piracy

Serious crimePay finesBear legal action and criminal

prosecution

How to refrain from Copy Right Issues?

Avoiding Software piracyBuying legal software

Kinley's Lesson Notes for Class X- 2010 21