Uploaded by Vivian Puah

Digital Security Risk

advertisement
Digital Security Risk
-
Is any event or action that could cause a loss of/ or damage to the computer hardware,
software, data, information, and processing capability
Cybercrime- online or internet-based illegal act
Computer crime- any illegal act that involves the use of computer
1. Hackers- someone who access a computer or network illegally
2. Crackers- similar to hackers, someone who access a computer or network illegally but has
malicious intent such as stealing information, destroying data
3. Script Kiddies- same as crackers – without skills and knowledge. Use prewritten scripts and
programs instead
4. Corporate Spies- steals sensitive and confidential company data and information
5. Unethical Employees- unauthorised employees who break into the company’s network to
access other computers or network or the company’s server
6. Cyberextortionist- an extortionist uses the internet to carry out their schemes. A
perpetrator sends threat to an individual or company to seek demands
7. Cyberterrorist- uses internet or network to destroy or damage the computers
5 types of attack
-
Malware
Botnets
Denial of service
Backdoor
Spoofing
1. Malware- programs that act without the user’s knowledge and deliberately alters operations
of computer and mobile devices
Type of malware
Virus
Description
Potentially damaging computer program that
affects or infects, a computer negatively by
altering the way the computer works without
the user's knowledge or permission.
2. Botnets- a group of compromised computers or mobile devices connected to a network
3. Denial of service- DoS attack disrupts computer access to an internet service such as the
web or email.
4. Backdoor- is a program or set of instructions in a program that allow users to bypass security
controls
5. Spoofing- is a technique intruder use to make their network or Internet transmission appear
legitimate.
Firewalls- hardware and/or software that protects a network’s resources from intrusion by users on
another network, such as Internet
Personal Firewalls- a security tools that detects and protects a personal computer and its data from
unauthorised intrusions
Unauthorised Access
-
Use of computer or network without permission
Access control
-
A security measure that defines who can access a computer, device, or network, when they can
access it, and what actions they can take while accessing it
Implementing control
1. User names and passwords
2. Passphrase- private combination of words, often containing mixed capitalized and
punctuation, associated with a user name that allows access to certain computer resources
3. PIN (passcode)
4. Possessed Objects
5. Biometric Devices- device that authenticates a person’s identity by translating a personal
characteristic, such as fingerprint, into a digital code that is compared with a digital code
stored in a computer verifying a physical or behavioural characteristic
6. Two-step verification
When access control fails
Digital Forensics- the discovery, collection, and analysis of evidence found on computers and
networks.
Database
-
Is a programme that is used to : store large amount of information
Organise and manage information
Make changes to the data
Modern Database Management System
-
Data is organised by DBMS and stored in only one location
i) Reduce data redundancy
Hierarchy of Data
Database
Files
Records/ Entity (Row of table)
Fields/Attribution
Characters
A collection of related files
A collection of related records
A collection of related fields
Can be name, number or combination of
characters that describe an aspect
e.g. Director last name
Basic building block of information
e.g. A, B, C, …., 1, 2, 3
A primary key is a field that uniquely identifies the record
Data Dictionary- is a detailed description of data/fields in database
Query- to access/filter the data in a database
Operational Database- database used to run a business
Data Warehouse- contains business data from almost all aspects of an enterprise
Data Mart- smaller version of data warehouse
Big Data- describe the volume of data that is so large and complex
Storage
-
It holds data, information, and instructions for future use
Storage Medium
-
Is the physical material on which the computer keeps data, information, and instructions,
Capacity- the number of bytes that a storage medium can hold.
Storage Device- is the computer hardware that records and/or retrieves items to and from storage
media
Access Time- measures the amount of time it takes a storage device to locate an item on a storage
medium
Characteristics of a hard disk include:








Capacity
Platters
Read/write heads
Cylinders
Sectors and Tracks
Revolution per minute
Transfer rate
Access Time
Cloud Storage- is an Internet service that provides storage for computer users
Users subscribe to cloud storage for a variety of reasons:






Access files from any computer
Store large file instantaneously
Allow others to access their files
View time-critical data and images immediately
Store offsite backups
Provide data center functions
Computer Communication
- which two or more computers or devices transfer data, instructions and information
Uses of communication
–
–
–
–
Wireless Messaging services
Collaboration
GPS
Wireless Internet Access
Computer Networks
-A collection of computers and devices connected together via communication devices and
transmission media
a) How vast are the connections?
 LAN (small)
 MAN (medium)
 WAN (large)
LAN (Local Area Network)
-
Limited geographical area- within a floor, building, or between buildings which are close to each
other
MAN (Metropolitan Area Network)
-
Larger geographical nature than LAN
WAN (Wide Area Network)
Network Topologies
-
How the layout of the computers and devices are on the network
Can be a combination of topologies
4 types of topologies




Star
Ring
Bus
Mesh
Standards
-
A network standard defines guidelines(protocol) that specify
Network Media
-
Transmission media consist of materials or substances capable of carrying one or more signals
2 types of media
 Physical (guided)
1. Twisted Pair Cable
2. Coaxial Cable
3. Fibre optic
 Wireless (unguided)
1. Infrared
2. Broadcast Radio
3. Microwaves
Twisted Pair Cable
-
It consists of pairs of twisted copper cable bundled together
The twisted wire help cancel out the electromagnetic interference from external source
Higher the level, greater the bandwidth of the cable
Coaxial Cable
A core of wire (either solid or stranded) surrounded by:
-
Insulating material (to separate the core from the shield)
A shield (to shield from EMI)
Plastic outer jacket
Fibre optic cable
-
Contains one or many thin strands of glass or plastic
Uses total internal reflection to transmit signals using light
Wireless medium
-
Falls within the electromagnetic spectrum
Download