Uploaded by mohammed allopin

Chapter 6

advertisement
Health Sciences College at – Aleith  Computer Skills
______________________________________________________________________
Chapter 6. DATA SECURITY
1. Information security
1- Definition
Information Security: The protection of information and information systems
from unauthorized access, use, disclosure, disruption, modification, or
destruction in order to provide confidentiality, integrity, and availability.
2- CIA triad Security
The CIA triad of information security was created to provide a baseline standard
for evaluating and implementing information security regardless of the
underlying system and/or organization.
o Confidentiality: Ensures that data or an information system is accessed
by only an authorized person. User Id’s and passwords, access control
lists (ACL) and policy based security are some of the methods through
which confidentiality is achieved.
o Integrity: Integrity assures that the data or information system can be
trusted. Ensures that it is edited by only authorized persons and remains
in its original state when at rest. Data encryption and hashing algorithms
are key processes in providing integrity.
o Availability: Data and information systems are available when required.
Hardware maintenance, software patching/upgrading and network
optimization ensures availability.
1
Health Sciences College at – Aleith  Computer Skills
______________________________________________________________________
3- Malware
Malware is a software used or created to disrupt computer operation, gather
sensitive information, or gain access to private computer systems.
• Types of Malware
o Viruses
o Trojan horses
o Worms
o Spyware
o Zombie
o Spam
o Adware
2
Health Sciences College at – Aleith  Computer Skills
______________________________________________________________________
• Viruses
o A program or piece of code that is loaded onto your computer without
your knowledge and runs against your wishes.
o Viruses copy themselves to other disks to spread to other
computers.
o They can be merely annoying or they can be destructive to your files.
• Trojan Horses
o A Trojan horse program has the appearance of having a useful and
desired function.
o A Trojan horse neither replicates nor copies itself, but causes
damage or compromises the security of the computer.
o These are often used to capture your logins and passwords.
• Worms
o A computer worm is a self-replicating computer program.
o It uses a network to send copies of itself to other nodes (computers on
the network) and it may do so without any user intervention.
o It does not need to attach itself to an existing program.
• Spyware
o Spyware is a type of malware installed on computers that collects
information about users without their knowledge.
o The presence of spyware is typically hidden from the user and can
be difficult to detect.
o Spyware programs steal important information, like passwords and
other personal identification information, and then send it off to
someone else.
• Zombie
3
Health Sciences College at – Aleith  Computer Skills
______________________________________________________________________
o Zombie programs take control of your computer and use it and its
internet connection to attack other computers, networks, or to
perform other criminal activities.
• Spam
o Spam is an email that you did not request and do not want. It is a
common way to spread viruses, Trojans Horses, etc.
• Adware
o Adware (short for advertising-supported software) is a type of
malware that automatically delivers advertisements.
o Common examples of Adware include pop-up ads on websites and
advertisements displayed by software.
4- Hackers
• Hackers are attackers who intend to access systems in order to disrupt
information security by either destroying, leaking, modifying or spying
information.
5- Forms of Cyber - Attacks
4
Health Sciences College at – Aleith  Computer Skills
______________________________________________________________________
• The forms of attacks by hackers differ from systems to disrupt information
security. The single penetration may consist of one or more attacks, not
necessarily all of the attacks.
Each penetration process is distinct in itself, depending on the state of the
system and the capabilities of the attacker. The following are some
common forms of cyber-attacks:
o Phishing: Phishing attack is the practice of sending emails that
appear to be from trusted sources with the goal of gaining personal
information.
o Denial-of-service (DoS) and distributed denial-of-service (DDoS)
attacks: A denialof- service attack overwhelms a system’s resources
so that it cannot respond to service requests. A DDoS attack is also
an attack on system’s resources, but it is launched from a large
number of other host machines that are infected by malicious
software controlled by the attacker.
2. Information Protection and privacy
1- Introduction
• Privacy is the claim of individuals, groups, or institutions to determine for
themselves when, how, and to what extent information about them is
communicated to others.
• In our digital age today, infringing on your privacy and identity on the
Internet is one of the most important threats facing network/Internet users.
As we are always close to our homes in order to preserve our privacy, we
must take care of our privacy on the Web. Today, computers, mobile
phones, and Internet space are among the most important areas of
privacy.
2- Privacy threats
5
Health Sciences College at – Aleith  Computer Skills
______________________________________________________________________
• Companies and data collection
• Privacy in social media
• Electronic Bullying
• Stealing and losing devices (PCs, Smartphones)
• Online identity theft
3- How can you prevent?
▪ Install protection software.
▪ Be careful when working with files from unknown or questionable sources.
▪ Do not open e-mail if you do not recognize the sender.
▪ Download files only from reputable Internet sites.
▪ Install firewall.
▪ Scan your hard drive for viruses monthly.
6
Download