SlideShare a Scribd company logo
1 of 62
2.5 Safety and Security of Data in ICT Systems
1.   What is personal data?
2.   What‟s the difference between privacy and
     security?
3.   Why should we be concerned about privacy
     of data?
4.   What do we mean by intrinsic value of data?
5.   What do we mean by commercial value of
     data?
   Make a list of organisations that you think
    store information about you

   What is personal data
    ◦ Facts and opinions about a living person

   Should we be worried about organisations
    storing personal data?
   Privacy
    ◦ The right of an individual to keep certain aspects of
      their life private

   Security
    ◦ The mechanism in place to protect the privacy of
      information
   To answer this question, we should consider the
    following questions:

    ◦ Who will be able to access the data?
      Identity theft

    ◦ Is the data accurate?
      If not can have adverse effect on individual e.g. bills aren‟t
       pay paid, refused a credit card

    ◦ Will the data be sold on?
      Health details sold on to insurance company

    ◦ How long will the data be kept?
      Failed job applications, is personal data kept?
   How valuable is this?




                     Value is often determined by demand and
                     supply
   How valuable is this to American
    Airlines?

   It is unlikely that anyone would
    want to buy this information BUT

   The information in its own right
    is valuable

   If the data in a flight booking
    system was lost or stolen it
    could cause customer
    dissatisfaction, the airline‟s
    reputation would then be
    damaged
   “Data has an intrinsic value”
    MEANS

   Data has a value in it‟s own
    right

   Another example:

   A record can have intrinsic
    value because of its
    association with famous
    people
   Data is now a commodity i.e.
    it has financial value

   It‟s value might be
    determined by how much
    time and effort it takes to
    collate the data

   It‟s value might also be
    determined by its potential
    use

   Who might sell data?
   Who might buy data? Why?
   http://www.myhouseprice.com/Default.cfm
1.   What is computer crime?
2.   What is malpractice?
3.   What are the weak points in an ICT System?
4.   What methods could be used to protect
     parts of a system?
5.   State 3 internal threats to an ICT system
6.   State 3 external threats to an ICT system
   Involves an illegal activity using a computer
    e.g.

    ◦ Theft of money

    ◦ Theft of information

    ◦ Theft of goods

    ◦ Malicious vandalism
   Negligence or improper professional
    behaviour when providing computer related
    services e.g.
    ◦ Software developers who do not properly test
      their software and distribute it full of bugs may
      be guilty of malpractice
    ◦ Failing to keep a password secure could be
      enabling unauthorised access to data.
    ◦ Failing to adhere to company procedures (code of
      conduct)
    ◦ Sending offensive material in e-mails
Viruses /
                           Illegal
                         programs
          Networks                      Data Entry


                        Weak Links                       Not
                        Within an IT                  following
Hacking
                          System                     procedures


                                         Use of
                                        portable
                IT                     computers
            Personnel        Data
                            Stored
                            Off line
   Data could be entered into the system with
    criminal intent e.g.

    ◦ A corrupt data entry clerk could purposely enter the
      wrong account number for a transaction so that an
      unsuspecting account holder is debited

   Possible Methods of prevention:

    ◦ Monitoring all access
    ◦ Automatic logging
    ◦ Separating the various stages involved in processing
      (no single person responsible)
   Acceptable use and Security policies are usually
    shared with employees during induction training, it
    can sometime be included in their contract.

   If Employees do not follow procedures such as “

    Log off from your machine when unattended”

   Then security becomes a risk

   Possible Methods of prevention:
    ◦ Staff training
    ◦ Staff monitoring
    ◦ Disciplinary procedures shared with staff
   The use of laptop and palmtop computers produces risks
    whenever sensitive data is being stored.

   Such devices are likely to be removed from an
    organisation‟s premises, where security can be controlled.

   Possible Methods of prevention:
    ◦ Keep portable computers within the premises of the
      organisation
    ◦ If removed from the premises of the organisation keep in a
      secure place e.g. fire proof safe
   Data that is stored off-line, on CD-R, memory
    stick or other devices is vulnerable to loss or
    theft.

   Possible Methods of prevention:
    ◦ Disk stores kept locked when left unattended
    ◦ Formal clerical systems in place so that details are
      recorded whenever files leave the store
    ◦ Filing and recoding system should be maintained
      rigorously to ensure that files are not mislaid
   Security procedures are only as good as the people using and
    enforcing them.

   Disgruntled, dishonest and greedy employees can pose a big
    threat to an organisation as they have easy access to the
    information system.

   Employees might:
    ◦ take bribes to provide information to a rival.
    ◦ Alter or erase data to sabotage the efforts of the company

   Possible Methods of prevention:
    ◦ Affective interview procedures – checking references and previous
      employees when recruiting staff
    ◦ Audit trails
   Hacking is defined as:
    ◦ Unauthorised access to data held on a computer system.

   It is possible that a hacker will access the system to
    commit fraud or to steal commercially valuable data.

   However a large number of hackers appear to break into
    systems simply to prove that they can do it.

   Hackers profile:
    ◦ Grudge against company or society in general
    ◦ Techno-terrorists
    ◦ Criminal purpose
   Possible Methods of prevention:
    ◦   Password discipline
    ◦   Terminals logged off
    ◦   Restricted access privileges
    ◦   All access monitored
    ◦   Off line storage of data and software (for restore)
   There is NO world wide legislation

   In the UK there is the Computer
    Misuse Act 1990
   When data is transferred over a WAN a line can be tapped
    to allow eavesdropping.

   This has been recognised as a real problem for internet
    users (security of using a credit card)

   Possible Methods of prevention:
    ◦ Firewall (used to prevent unauthorised access to an
      organisation‟s network)
    ◦ Virus protection: prevention, detection and repair
    ◦ Identification of users
    ◦ Levels of permitted access
   A virus is a program that is written with the sole purpose of
    infecting computer systems

   Many viruses spend time infecting documents and software
    before moving in to active state. (letting you know that they are
    there)

   This state is often triggered by an action or a date set on the
    program

   The fear is that viruses can spread and infect many areas of the
    hard drive.

   They can also reproduce and copy themselves to floppy disks,
    thus infecting the hard drive of the next computer it is used on
ORIGINATION        TRANSMISSION        REPRODUCTION          INFECTION

A programmer        Often, the virus   When another        Depending on what
writes a program    is attached to a   floppy disk is      the original
– the virus – to    normal program.    inserted into the   programmer wrote
cause mischief      It then copies     computer‟s disk     in the virus
or destruction.     itself to other    drive, the virus    program, a virus
The virus is        software on the    copies itself on    may display
capable of          hard disk.         to the floppy       messages,,use up
reproducing                            disk.               all the computers
itself.                                                    memory, destroy
                                                           data files or cause
                                                           serious system
                                                           errors
   Form – the most common virus in the world.
    ◦ This virus makes the speaker beep when you press a
     key on the 18th day of each month


   Jerusalem – serious virus
    ◦ Deletes a program you try to run on Friday 13th


   Dark Avenger – dangerous virus
    ◦ Corrupts the hard disk and backup copies
   Prevention

    ◦ Don‟t allow users to use their external storage devices e.g. USB pens
      on the system
    ◦ Systems can be set up to only allow specially formatted disks
    ◦ Use PC‟s without CD Drives and block USB ports

   Detection and Repair

    ◦ Detected and repaired using Anti-Virus Toolkit software – this
      software runs in the background whenever the computer is on.
    ◦ The software is usually able to remove the virus
    ◦ „Sheep-Dip‟ / „footbath‟ workstations – workstations fitted with the
      latest virus detectors
   Trojan horses
    ◦ A program that runs as a background task, collecting
      user log-in codes and passwords e.g. a program that
      simulates the system log-in screen

   Logic bombs
    ◦ Programs that cause system damage when triggered.
    ◦ Similar to a virus but does not replicate itself.
    ◦ Often used by employees to destroy firm‟s data when
      they leave
   Macro Virus
    ◦ Modern virus – exploits security loopholes in word
      processors, spreadsheets etc.
    ◦ Not usually destructive
    ◦ Can slow down the system, take up memory

   E-mail virus
    ◦   Spreads as an attachment to an e-mail file
    ◦   Runs when the attachment is downloaded or run
    ◦   Some very destructive
    ◦   Spread very quickly by reading address book and re-
        sending themselves
   Phantom virus
    ◦ Virus does not exist
    ◦ Problems caused by people e-mailing warnings –
      slows network traffic
    ◦ New variant tells people that a particular system file
      is a virus and gets them to delete it, causing system
      failure
   Back up all data regularly

   Do not download software from unknown sources

   Do not open attachments in e-mails

   Firewall

    ◦ Used to prevent unauthorised access to an organisation‟s network.
    ◦ The firewall software is placed between the network file server and the
      external network, often the internet.
    ◦ It checks all of the messages sent to the file server and filters the
      contents
   What is it?
    ◦ Involves an illegal activity using a computer

    ◦ It is sometimes thought that computer crime is a new
      phenomenon but as you will see, it is more the case that
      computers have provided new ways to commit old
      crimes.

   The following slides outline different categories
    of computer crime:
   Unauthorised access
    ◦ Hacking
   Fraud
    ◦ Stealing credit identities, amending details to financial accounts
   Publication of illicit material
    ◦ Pornography, racial hatred freely available on an international
      „ownerless‟ system (the internet)
   Theft
    ◦ Code behind a piece of software, consumer information – physically
      or electronically stolen
   Industrial espionage
    ◦ Gaining access to information about a competitor‟s marketing
      strategy, latest research etc. (electronically)
   Sabotage
    ◦ Damage effective functioning of an organisation e.g. personal
      grudge, political attack, economic (damaging their reputation)
   We need to protect:

    ◦ Program files
    ◦ Data Files
    ◦ Operating system files

   Why?

    ◦ All of these can be:

       Corrupted
       Deleted
       Altered
      (Accidentally or maliciously)
   Organisations - increasingly dependent on their information systems

   More important to protect the systems and integrity of the data they
    contain.

   Consequences of failing to do the above:

    ◦ Financial loss – replace the system, compensate customers, restore missing or
      compromised data
    ◦ Loss of reputation – Failure to product client‟s details and business information
      will result in the loss of trust
    ◦ Legal consequences – DPA requires organisations to ensure data stored on
      individuals is securely held. Failure to do so can result in legal action

   Threats to data security can come from two sources, Internal sources or
    external sources (outlined on following slides)
   Non Deliberate
    ◦ An organisation‟s employees may accidentally compromise data
      security or integrity.

         Simple clerical errors during input/processing stages may affect
          accuracy of data
         Files may be accidentally erased through misuse
         Internally produced software may be flawed, consequently damaging
          data
         E-mail attachments may contain viruses, accidentally opened and thus
          activated.

   Deliberate
    ◦   Those responsible for ICT security need to be aware of the „enemy
        within‟. Two main threats:

         The disgruntled employee – grudge against the company
         Employee who decides to defraud the organisation for financial gain
   Non Deliberate
    ◦ The main threats of this type are „disasters‟.
    ◦ These may be natural:
         Floods, Extreme weather conditions, earthquakes, volcanoes etc.
    ◦ Human mechanical
         Plane crashes, power cuts, fires, building collapse etc.
    ◦ Both have potential to wipe out an organisation‟s Information systems.

   Deliberate
    ◦   Threats of this type can take many forms, including:

         Criminals wishing to defraud the organisation by accessing and amending
          financial data;
         Viruses with potential to corrupt data
         Industrial espionage, i.e. rival organisations accessing confidential information
          in order to gain competitive advantage
         Actual theft of hardware/software
         Terrorist attack
   The following headings suggest and describe
    ways of preventing computer crime and
    malpractice
   Access privileges define for each user exactly which computers
    and what data he or she is allowed to access, and what they are
    allowed to do with that data.

   Possible access rights include

    ◦ Full Rights – a user can carry out any action on the file or data
    ◦ Read only – the data can be accessed to be viewed or printed, but not
      altered in any way
    ◦ Read and write – the user can read or create new data records
    ◦ Amend – the user can change the data held in a record
    ◦ Delete – the user can delete a whole record
    ◦ No Access – the user is barred from any form of access to the data
   Biometrics is the name given to techniques that
    convert a human characteristic such as a
    fingerprint in to a digital form that can be
    stored in a computer.

   These characteristics are unique

   Currently the face, the shape of the hand, the
    eye and the voice are actually used for
    identification as well as a fingerprint.
   http://www.sciencedaily.com/news/matter_energy/biometric/
   It is necessary to protect the hardware from theft and
    unauthorised access, how:

    ◦ Security guards – responsible for permitting access to the
      building, logging visits, challenging intruders

    ◦ Secure areas – some equipment (e.g. main servers) may be
      held in a secure area with limited access. This area may be
      locked, alarmed and monitored.

    ◦ Biometric access devices – access to the building using
      fingerprints, voice, iris etc.
   Data can be compromised by errors made at the point of
    data entry. In order to optimise data accuracy, there
    should be:

    ◦ Set procedures for data entry
    ◦ A means to check the validity

   This might involve:

    ◦ Batch-processing
    ◦ Validation checks (e.g. range checks, presence checks
      etc.)
    ◦ Verification procedures (e.g. checking for double entry of
      data and confirming with the client that their address has
      been correctly entered)
   Employees should be made aware of the need to:
    ◦ Regularly change passwords
    ◦ Avoid obvious passwords such as:
        Postcode
        Telephone number
        Name
        Pet
    ◦ Avoid other standard passwords like:
      FRED
      PASS
      SECRET etc.
    ◦ Don‟t write your password down
    ◦ Your password should incorporate characters other than
      letters – such as $ or %
   Most effective way to prevent employees
    unintentionally compromising the security of
    systems and data is to ensure that they are well
    trained.


   Security awareness can be reinforced through
    the use of posters, screen messages etc.
   Data on a network is vulnerable to wire-
    tapping when it is being transmitted over a
    network.

   One method of preventing this is to encrypt the
    data, making it incomprehensible to anyone
    who does not hold the „key‟ to decode it.

           (No system is completely foolproof)
     http://www.infosecurity-magazine.com/news/80/encryption/ Encryption news
   Encryption Explained using the SSL protocol

   http://www.youtube.com/watch?v=a72fHRr6MRU
   http://www.youtube.com/watch?v=SJJmoDZ3il8&feature=related
   There are many ways of encrypting data, often
    based on either transposition or substitution.

   Transposition – Where characters are switched
    around

   Substitution – Where characters are replaced by
    other characters
   In a Transposition cipher, the message could
    be written in a grid row by row and
    transmitted column by column.
   The sentence „Here is the exam paper‟ could be written in
    a 5x5 grid:

                      H   E   R   E   *

                      I   S   *   T   H

                     E    *   E   X   A

                     M    *   P   A   P

                     E    R   *   *   *

   And transmitted as: HIEMEES**RR*EP*ETHXA**HAP*
HERE*                                HERE*
                 IS*TH                                IS*TH
HERE IS THE                                                        HERE IS THE
                 E*EXA        HIEMEES**RR*EP*ETHX     E*EXA
EXAM PAPER                              A**HAP*                    EXAM PAPER
                 M*PAP                                M*PAP
                 ER***                                ER***
Message sent                       Message                     Message received
 (plaintext)   Encryption        transmitted        Decryption    (plaintext)
               (ciphertext)                         (ciphertext)
   Using the same grid, decode the message
    ITT*O*E*HRWDNIYA*OS*NITT*



                  I   *   W   A   N

                  T   E   D   *   I

                  T   *   N   O   T

                  *   H   I   S   T

                  O   R   Y   *   *
1.   What legislations exist to protect data?
Explain using examples, the difference
between malpractice and crime as applied to
Information Systems.

                                         (4)
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11
2.5 safety and security of data in ict systems 13 12-11

More Related Content

What's hot

Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of ComputerFaizan Janjua
 
Fusing digital forensics, electronic discovery and incident response
Fusing digital forensics, electronic discovery and incident responseFusing digital forensics, electronic discovery and incident response
Fusing digital forensics, electronic discovery and incident responseDr. Richard Adams
 
Information management
Information managementInformation management
Information managementDeepak John
 
Understanding computer investigation
Understanding computer investigationUnderstanding computer investigation
Understanding computer investigationOnline
 
06. security concept
06. security concept06. security concept
06. security conceptMuhammad Ahad
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy Dguest34b014
 
Cb12e basic ppt ch15
Cb12e basic ppt ch15Cb12e basic ppt ch15
Cb12e basic ppt ch15Eric
 
Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging TechnologiesAnjan Mahanta
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitysamina khan
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - NotesKranthi
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsSCREAM138
 
Insider threats - Lessons from Snowden (ISF UK Chapter)
Insider threats - Lessons from Snowden (ISF UK Chapter)Insider threats - Lessons from Snowden (ISF UK Chapter)
Insider threats - Lessons from Snowden (ISF UK Chapter)Huntsman Security
 
Information security management
Information security managementInformation security management
Information security managementUMaine
 
Computer forensics
Computer forensicsComputer forensics
Computer forensicsdeaneal
 

What's hot (20)

Isys20261 lecture 02
Isys20261 lecture 02Isys20261 lecture 02
Isys20261 lecture 02
 
Basic Security Concepts of Computer
Basic Security Concepts of ComputerBasic Security Concepts of Computer
Basic Security Concepts of Computer
 
Fusing digital forensics, electronic discovery and incident response
Fusing digital forensics, electronic discovery and incident responseFusing digital forensics, electronic discovery and incident response
Fusing digital forensics, electronic discovery and incident response
 
Information management
Information managementInformation management
Information management
 
Understanding computer investigation
Understanding computer investigationUnderstanding computer investigation
Understanding computer investigation
 
06. security concept
06. security concept06. security concept
06. security concept
 
Computer Security Policy D
Computer Security Policy DComputer Security Policy D
Computer Security Policy D
 
Cb12e basic ppt ch15
Cb12e basic ppt ch15Cb12e basic ppt ch15
Cb12e basic ppt ch15
 
Emerging Technologies
Emerging TechnologiesEmerging Technologies
Emerging Technologies
 
PACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic ProceduresPACE-IT, Security+ 2.4: Basic Forensic Procedures
PACE-IT, Security+ 2.4: Basic Forensic Procedures
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Week 12
Week 12Week 12
Week 12
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
PACE-IT, Security+2.8: Risk Management Best Practices
PACE-IT, Security+2.8: Risk Management Best PracticesPACE-IT, Security+2.8: Risk Management Best Practices
PACE-IT, Security+2.8: Risk Management Best Practices
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 
Insider threats - Lessons from Snowden (ISF UK Chapter)
Insider threats - Lessons from Snowden (ISF UK Chapter)Insider threats - Lessons from Snowden (ISF UK Chapter)
Insider threats - Lessons from Snowden (ISF UK Chapter)
 
Information security management
Information security managementInformation security management
Information security management
 
Computer forensics
Computer forensicsComputer forensics
Computer forensics
 

Viewers also liked

2.1 ict systems and components
2.1 ict systems and components2.1 ict systems and components
2.1 ict systems and componentsmrmwood
 
2.9 The consequences of the use of ict
2.9 The consequences of the use of ict2.9 The consequences of the use of ict
2.9 The consequences of the use of ictmrmwood
 
2.3 people and ict systems
2.3 people and ict systems2.3 people and ict systems
2.3 people and ict systemsmrmwood
 
2.8 factors affecting the use of ict
2.8 factors affecting the use of ict2.8 factors affecting the use of ict
2.8 factors affecting the use of ictmrmwood
 
3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisationsmrmwood
 
2.7 what ict can provide
2.7 what ict can provide2.7 what ict can provide
2.7 what ict can providemrmwood
 
AQA AS ICT INFO2 Revision
AQA AS ICT INFO2 RevisionAQA AS ICT INFO2 Revision
AQA AS ICT INFO2 RevisionSnowfairy007
 
2.2 data and information
2.2 data and information2.2 data and information
2.2 data and informationmrmwood
 
Computer misuse act new 13 12-11
Computer misuse act new 13 12-11Computer misuse act new 13 12-11
Computer misuse act new 13 12-11mrmwood
 
Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11mrmwood
 
3.8 development methods
3.8 development methods3.8 development methods
3.8 development methodsmrmwood
 
3.7 developing ict solutions
3.7 developing ict solutions3.7 developing ict solutions
3.7 developing ict solutionsmrmwood
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11mrmwood
 
2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recoverymrmwood
 
3.12 external and internal resources
3.12 external and internal resources3.12 external and internal resources
3.12 external and internal resourcesmrmwood
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents actmrmwood
 
3.11 training and supporting users
3.11 training and supporting users3.11 training and supporting users
3.11 training and supporting usersmrmwood
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents actmrmwood
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents actmrmwood
 
3.9 techniques and tools for systems development
3.9 techniques and tools for systems development3.9 techniques and tools for systems development
3.9 techniques and tools for systems developmentmrmwood
 

Viewers also liked (20)

2.1 ict systems and components
2.1 ict systems and components2.1 ict systems and components
2.1 ict systems and components
 
2.9 The consequences of the use of ict
2.9 The consequences of the use of ict2.9 The consequences of the use of ict
2.9 The consequences of the use of ict
 
2.3 people and ict systems
2.3 people and ict systems2.3 people and ict systems
2.3 people and ict systems
 
2.8 factors affecting the use of ict
2.8 factors affecting the use of ict2.8 factors affecting the use of ict
2.8 factors affecting the use of ict
 
3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations3.10 Introducing large ict systems into organisations
3.10 Introducing large ict systems into organisations
 
2.7 what ict can provide
2.7 what ict can provide2.7 what ict can provide
2.7 what ict can provide
 
AQA AS ICT INFO2 Revision
AQA AS ICT INFO2 RevisionAQA AS ICT INFO2 Revision
AQA AS ICT INFO2 Revision
 
2.2 data and information
2.2 data and information2.2 data and information
2.2 data and information
 
Computer misuse act new 13 12-11
Computer misuse act new 13 12-11Computer misuse act new 13 12-11
Computer misuse act new 13 12-11
 
Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11Copyright designs and patents act new 13 12-11
Copyright designs and patents act new 13 12-11
 
3.8 development methods
3.8 development methods3.8 development methods
3.8 development methods
 
3.7 developing ict solutions
3.7 developing ict solutions3.7 developing ict solutions
3.7 developing ict solutions
 
Data protection act new 13 12-11
Data protection act new 13 12-11Data protection act new 13 12-11
Data protection act new 13 12-11
 
2.6 backup and recovery
2.6 backup and recovery2.6 backup and recovery
2.6 backup and recovery
 
3.12 external and internal resources
3.12 external and internal resources3.12 external and internal resources
3.12 external and internal resources
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
 
3.11 training and supporting users
3.11 training and supporting users3.11 training and supporting users
3.11 training and supporting users
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
 
Copyright designs and patents act
Copyright designs and patents actCopyright designs and patents act
Copyright designs and patents act
 
3.9 techniques and tools for systems development
3.9 techniques and tools for systems development3.9 techniques and tools for systems development
3.9 techniques and tools for systems development
 

Similar to 2.5 safety and security of data in ict systems 13 12-11

Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsMuhammadRobeel3
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber securityAnimesh Roy
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitynazar60
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfanandanand521251
 
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxLESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxmahaliacaraan
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...David Menken
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacyArdit Meti
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11limsh
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security pptGryffin EJ
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theftDeepak John
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxCabdullhiY
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”tunzida045
 

Similar to 2.5 safety and security of data in ict systems 13 12-11 (20)

Computer-Security.pptx
Computer-Security.pptxComputer-Security.pptx
Computer-Security.pptx
 
Computer security
Computer securityComputer security
Computer security
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
Computer security
Computer securityComputer security
Computer security
 
Computer security
Computer securityComputer security
Computer security
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 
Ch # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guardsCh # 10 computer security risks and safe guards
Ch # 10 computer security risks and safe guards
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Mis 1
Mis 1Mis 1
Mis 1
 
In computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdfIn computer security, a vulnerability is a weakness which allows an .pdf
In computer security, a vulnerability is a weakness which allows an .pdf
 
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxLESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
 
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
Security Awareness Training - For Companies With Access to NYS "Sensitive" In...
 
Computer security ethics_and_privacy
Computer security ethics_and_privacyComputer security ethics_and_privacy
Computer security ethics_and_privacy
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
BAIT1003 Chapter 11
BAIT1003 Chapter 11BAIT1003 Chapter 11
BAIT1003 Chapter 11
 
Information security / Cyber Security ppt
Information security / Cyber Security pptInformation security / Cyber Security ppt
Information security / Cyber Security ppt
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
SECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptxSECURING INFORMATION SYSTEM 1.pptx
SECURING INFORMATION SYSTEM 1.pptx
 
“In 2024 Guide to Cyber Security: Protect Your Data Today”
“In 2024  Guide to Cyber Security: Protect Your Data Today”“In 2024  Guide to Cyber Security: Protect Your Data Today”
“In 2024 Guide to Cyber Security: Protect Your Data Today”
 

More from mrmwood

Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Actmrmwood
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policiesmrmwood
 
3.3 managing ict 3
3.3 managing ict 33.3 managing ict 3
3.3 managing ict 3mrmwood
 
3.4 ict strategy
3.4 ict strategy3.4 ict strategy
3.4 ict strategymrmwood
 
3.2 information and systems
3.2 information and systems3.2 information and systems
3.2 information and systemsmrmwood
 
1.10 evaluation
1.10 evaluation1.10 evaluation
1.10 evaluationmrmwood
 
Validation and Verification
Validation and VerificationValidation and Verification
Validation and Verificationmrmwood
 
1.7 selection and use of appropriate software
1.7 selection and use of appropriate software1.7 selection and use of appropriate software
1.7 selection and use of appropriate softwaremrmwood
 

More from mrmwood (10)

Computer Misuse Act
Computer Misuse ActComputer Misuse Act
Computer Misuse Act
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
3.5 ICT Policies
3.5 ICT Policies3.5 ICT Policies
3.5 ICT Policies
 
3.3 managing ict 3
3.3 managing ict 33.3 managing ict 3
3.3 managing ict 3
 
3.4 ict strategy
3.4 ict strategy3.4 ict strategy
3.4 ict strategy
 
3.2 information and systems
3.2 information and systems3.2 information and systems
3.2 information and systems
 
1.10 evaluation
1.10 evaluation1.10 evaluation
1.10 evaluation
 
Validation and Verification
Validation and VerificationValidation and Verification
Validation and Verification
 
1.7 selection and use of appropriate software
1.7 selection and use of appropriate software1.7 selection and use of appropriate software
1.7 selection and use of appropriate software
 

Recently uploaded

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfChris Hunter
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 

Recently uploaded (20)

Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 

2.5 safety and security of data in ict systems 13 12-11

  • 1. 2.5 Safety and Security of Data in ICT Systems
  • 2.
  • 3. 1. What is personal data? 2. What‟s the difference between privacy and security? 3. Why should we be concerned about privacy of data? 4. What do we mean by intrinsic value of data? 5. What do we mean by commercial value of data?
  • 4. Make a list of organisations that you think store information about you  What is personal data ◦ Facts and opinions about a living person  Should we be worried about organisations storing personal data?
  • 5. Privacy ◦ The right of an individual to keep certain aspects of their life private  Security ◦ The mechanism in place to protect the privacy of information
  • 6. To answer this question, we should consider the following questions: ◦ Who will be able to access the data?  Identity theft ◦ Is the data accurate?  If not can have adverse effect on individual e.g. bills aren‟t pay paid, refused a credit card ◦ Will the data be sold on?  Health details sold on to insurance company ◦ How long will the data be kept?  Failed job applications, is personal data kept?
  • 7. How valuable is this? Value is often determined by demand and supply
  • 8. How valuable is this to American Airlines?  It is unlikely that anyone would want to buy this information BUT  The information in its own right is valuable  If the data in a flight booking system was lost or stolen it could cause customer dissatisfaction, the airline‟s reputation would then be damaged
  • 9. “Data has an intrinsic value” MEANS  Data has a value in it‟s own right  Another example:  A record can have intrinsic value because of its association with famous people
  • 10. Data is now a commodity i.e. it has financial value  It‟s value might be determined by how much time and effort it takes to collate the data  It‟s value might also be determined by its potential use  Who might sell data?  Who might buy data? Why?  http://www.myhouseprice.com/Default.cfm
  • 11. 1. What is computer crime? 2. What is malpractice? 3. What are the weak points in an ICT System? 4. What methods could be used to protect parts of a system? 5. State 3 internal threats to an ICT system 6. State 3 external threats to an ICT system
  • 12. Involves an illegal activity using a computer e.g. ◦ Theft of money ◦ Theft of information ◦ Theft of goods ◦ Malicious vandalism
  • 13. Negligence or improper professional behaviour when providing computer related services e.g. ◦ Software developers who do not properly test their software and distribute it full of bugs may be guilty of malpractice ◦ Failing to keep a password secure could be enabling unauthorised access to data. ◦ Failing to adhere to company procedures (code of conduct) ◦ Sending offensive material in e-mails
  • 14. Viruses / Illegal programs Networks Data Entry Weak Links Not Within an IT following Hacking System procedures Use of portable IT computers Personnel Data Stored Off line
  • 15. Data could be entered into the system with criminal intent e.g. ◦ A corrupt data entry clerk could purposely enter the wrong account number for a transaction so that an unsuspecting account holder is debited  Possible Methods of prevention: ◦ Monitoring all access ◦ Automatic logging ◦ Separating the various stages involved in processing (no single person responsible)
  • 16. Acceptable use and Security policies are usually shared with employees during induction training, it can sometime be included in their contract.  If Employees do not follow procedures such as “ Log off from your machine when unattended”  Then security becomes a risk  Possible Methods of prevention: ◦ Staff training ◦ Staff monitoring ◦ Disciplinary procedures shared with staff
  • 17. The use of laptop and palmtop computers produces risks whenever sensitive data is being stored.  Such devices are likely to be removed from an organisation‟s premises, where security can be controlled.  Possible Methods of prevention: ◦ Keep portable computers within the premises of the organisation ◦ If removed from the premises of the organisation keep in a secure place e.g. fire proof safe
  • 18. Data that is stored off-line, on CD-R, memory stick or other devices is vulnerable to loss or theft.  Possible Methods of prevention: ◦ Disk stores kept locked when left unattended ◦ Formal clerical systems in place so that details are recorded whenever files leave the store ◦ Filing and recoding system should be maintained rigorously to ensure that files are not mislaid
  • 19. Security procedures are only as good as the people using and enforcing them.  Disgruntled, dishonest and greedy employees can pose a big threat to an organisation as they have easy access to the information system.  Employees might: ◦ take bribes to provide information to a rival. ◦ Alter or erase data to sabotage the efforts of the company  Possible Methods of prevention: ◦ Affective interview procedures – checking references and previous employees when recruiting staff ◦ Audit trails
  • 20. Hacking is defined as: ◦ Unauthorised access to data held on a computer system.  It is possible that a hacker will access the system to commit fraud or to steal commercially valuable data.  However a large number of hackers appear to break into systems simply to prove that they can do it.  Hackers profile: ◦ Grudge against company or society in general ◦ Techno-terrorists ◦ Criminal purpose
  • 21. Possible Methods of prevention: ◦ Password discipline ◦ Terminals logged off ◦ Restricted access privileges ◦ All access monitored ◦ Off line storage of data and software (for restore)
  • 22. There is NO world wide legislation  In the UK there is the Computer Misuse Act 1990
  • 23. When data is transferred over a WAN a line can be tapped to allow eavesdropping.  This has been recognised as a real problem for internet users (security of using a credit card)  Possible Methods of prevention: ◦ Firewall (used to prevent unauthorised access to an organisation‟s network) ◦ Virus protection: prevention, detection and repair ◦ Identification of users ◦ Levels of permitted access
  • 24. A virus is a program that is written with the sole purpose of infecting computer systems  Many viruses spend time infecting documents and software before moving in to active state. (letting you know that they are there)  This state is often triggered by an action or a date set on the program  The fear is that viruses can spread and infect many areas of the hard drive.  They can also reproduce and copy themselves to floppy disks, thus infecting the hard drive of the next computer it is used on
  • 25. ORIGINATION TRANSMISSION REPRODUCTION INFECTION A programmer Often, the virus When another Depending on what writes a program is attached to a floppy disk is the original – the virus – to normal program. inserted into the programmer wrote cause mischief It then copies computer‟s disk in the virus or destruction. itself to other drive, the virus program, a virus The virus is software on the copies itself on may display capable of hard disk. to the floppy messages,,use up reproducing disk. all the computers itself. memory, destroy data files or cause serious system errors
  • 26. Form – the most common virus in the world. ◦ This virus makes the speaker beep when you press a key on the 18th day of each month  Jerusalem – serious virus ◦ Deletes a program you try to run on Friday 13th  Dark Avenger – dangerous virus ◦ Corrupts the hard disk and backup copies
  • 27. Prevention ◦ Don‟t allow users to use their external storage devices e.g. USB pens on the system ◦ Systems can be set up to only allow specially formatted disks ◦ Use PC‟s without CD Drives and block USB ports  Detection and Repair ◦ Detected and repaired using Anti-Virus Toolkit software – this software runs in the background whenever the computer is on. ◦ The software is usually able to remove the virus ◦ „Sheep-Dip‟ / „footbath‟ workstations – workstations fitted with the latest virus detectors
  • 28. Trojan horses ◦ A program that runs as a background task, collecting user log-in codes and passwords e.g. a program that simulates the system log-in screen  Logic bombs ◦ Programs that cause system damage when triggered. ◦ Similar to a virus but does not replicate itself. ◦ Often used by employees to destroy firm‟s data when they leave
  • 29. Macro Virus ◦ Modern virus – exploits security loopholes in word processors, spreadsheets etc. ◦ Not usually destructive ◦ Can slow down the system, take up memory  E-mail virus ◦ Spreads as an attachment to an e-mail file ◦ Runs when the attachment is downloaded or run ◦ Some very destructive ◦ Spread very quickly by reading address book and re- sending themselves
  • 30. Phantom virus ◦ Virus does not exist ◦ Problems caused by people e-mailing warnings – slows network traffic ◦ New variant tells people that a particular system file is a virus and gets them to delete it, causing system failure
  • 31. Back up all data regularly  Do not download software from unknown sources  Do not open attachments in e-mails  Firewall ◦ Used to prevent unauthorised access to an organisation‟s network. ◦ The firewall software is placed between the network file server and the external network, often the internet. ◦ It checks all of the messages sent to the file server and filters the contents
  • 32. What is it? ◦ Involves an illegal activity using a computer ◦ It is sometimes thought that computer crime is a new phenomenon but as you will see, it is more the case that computers have provided new ways to commit old crimes.  The following slides outline different categories of computer crime:
  • 33. Unauthorised access ◦ Hacking  Fraud ◦ Stealing credit identities, amending details to financial accounts  Publication of illicit material ◦ Pornography, racial hatred freely available on an international „ownerless‟ system (the internet)  Theft ◦ Code behind a piece of software, consumer information – physically or electronically stolen  Industrial espionage ◦ Gaining access to information about a competitor‟s marketing strategy, latest research etc. (electronically)  Sabotage ◦ Damage effective functioning of an organisation e.g. personal grudge, political attack, economic (damaging their reputation)
  • 34. We need to protect: ◦ Program files ◦ Data Files ◦ Operating system files  Why? ◦ All of these can be:  Corrupted  Deleted  Altered (Accidentally or maliciously)
  • 35. Organisations - increasingly dependent on their information systems  More important to protect the systems and integrity of the data they contain.  Consequences of failing to do the above: ◦ Financial loss – replace the system, compensate customers, restore missing or compromised data ◦ Loss of reputation – Failure to product client‟s details and business information will result in the loss of trust ◦ Legal consequences – DPA requires organisations to ensure data stored on individuals is securely held. Failure to do so can result in legal action  Threats to data security can come from two sources, Internal sources or external sources (outlined on following slides)
  • 36. Non Deliberate ◦ An organisation‟s employees may accidentally compromise data security or integrity.  Simple clerical errors during input/processing stages may affect accuracy of data  Files may be accidentally erased through misuse  Internally produced software may be flawed, consequently damaging data  E-mail attachments may contain viruses, accidentally opened and thus activated.  Deliberate ◦ Those responsible for ICT security need to be aware of the „enemy within‟. Two main threats:  The disgruntled employee – grudge against the company  Employee who decides to defraud the organisation for financial gain
  • 37. Non Deliberate ◦ The main threats of this type are „disasters‟. ◦ These may be natural:  Floods, Extreme weather conditions, earthquakes, volcanoes etc. ◦ Human mechanical  Plane crashes, power cuts, fires, building collapse etc. ◦ Both have potential to wipe out an organisation‟s Information systems.  Deliberate ◦ Threats of this type can take many forms, including:  Criminals wishing to defraud the organisation by accessing and amending financial data;  Viruses with potential to corrupt data  Industrial espionage, i.e. rival organisations accessing confidential information in order to gain competitive advantage  Actual theft of hardware/software  Terrorist attack
  • 38. The following headings suggest and describe ways of preventing computer crime and malpractice
  • 39. Access privileges define for each user exactly which computers and what data he or she is allowed to access, and what they are allowed to do with that data.  Possible access rights include ◦ Full Rights – a user can carry out any action on the file or data ◦ Read only – the data can be accessed to be viewed or printed, but not altered in any way ◦ Read and write – the user can read or create new data records ◦ Amend – the user can change the data held in a record ◦ Delete – the user can delete a whole record ◦ No Access – the user is barred from any form of access to the data
  • 40. Biometrics is the name given to techniques that convert a human characteristic such as a fingerprint in to a digital form that can be stored in a computer.  These characteristics are unique  Currently the face, the shape of the hand, the eye and the voice are actually used for identification as well as a fingerprint.  http://www.sciencedaily.com/news/matter_energy/biometric/
  • 41. It is necessary to protect the hardware from theft and unauthorised access, how: ◦ Security guards – responsible for permitting access to the building, logging visits, challenging intruders ◦ Secure areas – some equipment (e.g. main servers) may be held in a secure area with limited access. This area may be locked, alarmed and monitored. ◦ Biometric access devices – access to the building using fingerprints, voice, iris etc.
  • 42. Data can be compromised by errors made at the point of data entry. In order to optimise data accuracy, there should be: ◦ Set procedures for data entry ◦ A means to check the validity  This might involve: ◦ Batch-processing ◦ Validation checks (e.g. range checks, presence checks etc.) ◦ Verification procedures (e.g. checking for double entry of data and confirming with the client that their address has been correctly entered)
  • 43. Employees should be made aware of the need to: ◦ Regularly change passwords ◦ Avoid obvious passwords such as:  Postcode  Telephone number  Name  Pet ◦ Avoid other standard passwords like:  FRED  PASS  SECRET etc. ◦ Don‟t write your password down ◦ Your password should incorporate characters other than letters – such as $ or %
  • 44. Most effective way to prevent employees unintentionally compromising the security of systems and data is to ensure that they are well trained.  Security awareness can be reinforced through the use of posters, screen messages etc.
  • 45. Data on a network is vulnerable to wire- tapping when it is being transmitted over a network.  One method of preventing this is to encrypt the data, making it incomprehensible to anyone who does not hold the „key‟ to decode it. (No system is completely foolproof) http://www.infosecurity-magazine.com/news/80/encryption/ Encryption news
  • 46. Encryption Explained using the SSL protocol  http://www.youtube.com/watch?v=a72fHRr6MRU  http://www.youtube.com/watch?v=SJJmoDZ3il8&feature=related
  • 47. There are many ways of encrypting data, often based on either transposition or substitution.  Transposition – Where characters are switched around  Substitution – Where characters are replaced by other characters
  • 48. In a Transposition cipher, the message could be written in a grid row by row and transmitted column by column.
  • 49. The sentence „Here is the exam paper‟ could be written in a 5x5 grid: H E R E * I S * T H E * E X A M * P A P E R * * *  And transmitted as: HIEMEES**RR*EP*ETHXA**HAP*
  • 50. HERE* HERE* IS*TH IS*TH HERE IS THE HERE IS THE E*EXA HIEMEES**RR*EP*ETHX E*EXA EXAM PAPER A**HAP* EXAM PAPER M*PAP M*PAP ER*** ER*** Message sent Message Message received (plaintext) Encryption transmitted Decryption (plaintext) (ciphertext) (ciphertext)
  • 51. Using the same grid, decode the message ITT*O*E*HRWDNIYA*OS*NITT* I * W A N T E D * I T * N O T * H I S T O R Y * *
  • 52. 1. What legislations exist to protect data?
  • 53. Explain using examples, the difference between malpractice and crime as applied to Information Systems. (4)