Digital Security Risk - Is any event or action that could cause a loss of/ or damage to the computer hardware, software, data, information, and processing capability Cybercrime- online or internet-based illegal act Computer crime- any illegal act that involves the use of computer 1. Hackers- someone who access a computer or network illegally 2. Crackers- similar to hackers, someone who access a computer or network illegally but has malicious intent such as stealing information, destroying data 3. Script Kiddies- same as crackers – without skills and knowledge. Use prewritten scripts and programs instead 4. Corporate Spies- steals sensitive and confidential company data and information 5. Unethical Employees- unauthorised employees who break into the company’s network to access other computers or network or the company’s server 6. Cyberextortionist- an extortionist uses the internet to carry out their schemes. A perpetrator sends threat to an individual or company to seek demands 7. Cyberterrorist- uses internet or network to destroy or damage the computers 5 types of attack - Malware Botnets Denial of service Backdoor Spoofing 1. Malware- programs that act without the user’s knowledge and deliberately alters operations of computer and mobile devices Type of malware Virus Description Potentially damaging computer program that affects or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission. 2. Botnets- a group of compromised computers or mobile devices connected to a network 3. Denial of service- DoS attack disrupts computer access to an internet service such as the web or email. 4. Backdoor- is a program or set of instructions in a program that allow users to bypass security controls 5. Spoofing- is a technique intruder use to make their network or Internet transmission appear legitimate. Firewalls- hardware and/or software that protects a network’s resources from intrusion by users on another network, such as Internet Personal Firewalls- a security tools that detects and protects a personal computer and its data from unauthorised intrusions Unauthorised Access - Use of computer or network without permission Access control - A security measure that defines who can access a computer, device, or network, when they can access it, and what actions they can take while accessing it Implementing control 1. User names and passwords 2. Passphrase- private combination of words, often containing mixed capitalized and punctuation, associated with a user name that allows access to certain computer resources 3. PIN (passcode) 4. Possessed Objects 5. Biometric Devices- device that authenticates a person’s identity by translating a personal characteristic, such as fingerprint, into a digital code that is compared with a digital code stored in a computer verifying a physical or behavioural characteristic 6. Two-step verification When access control fails Digital Forensics- the discovery, collection, and analysis of evidence found on computers and networks. Database - Is a programme that is used to : store large amount of information Organise and manage information Make changes to the data Modern Database Management System - Data is organised by DBMS and stored in only one location i) Reduce data redundancy Hierarchy of Data Database Files Records/ Entity (Row of table) Fields/Attribution Characters A collection of related files A collection of related records A collection of related fields Can be name, number or combination of characters that describe an aspect e.g. Director last name Basic building block of information e.g. A, B, C, …., 1, 2, 3 A primary key is a field that uniquely identifies the record Data Dictionary- is a detailed description of data/fields in database Query- to access/filter the data in a database Operational Database- database used to run a business Data Warehouse- contains business data from almost all aspects of an enterprise Data Mart- smaller version of data warehouse Big Data- describe the volume of data that is so large and complex Storage - It holds data, information, and instructions for future use Storage Medium - Is the physical material on which the computer keeps data, information, and instructions, Capacity- the number of bytes that a storage medium can hold. Storage Device- is the computer hardware that records and/or retrieves items to and from storage media Access Time- measures the amount of time it takes a storage device to locate an item on a storage medium Characteristics of a hard disk include: Capacity Platters Read/write heads Cylinders Sectors and Tracks Revolution per minute Transfer rate Access Time Cloud Storage- is an Internet service that provides storage for computer users Users subscribe to cloud storage for a variety of reasons: Access files from any computer Store large file instantaneously Allow others to access their files View time-critical data and images immediately Store offsite backups Provide data center functions Computer Communication - which two or more computers or devices transfer data, instructions and information Uses of communication – – – – Wireless Messaging services Collaboration GPS Wireless Internet Access Computer Networks -A collection of computers and devices connected together via communication devices and transmission media a) How vast are the connections? LAN (small) MAN (medium) WAN (large) LAN (Local Area Network) - Limited geographical area- within a floor, building, or between buildings which are close to each other MAN (Metropolitan Area Network) - Larger geographical nature than LAN WAN (Wide Area Network) Network Topologies - How the layout of the computers and devices are on the network Can be a combination of topologies 4 types of topologies Star Ring Bus Mesh Standards - A network standard defines guidelines(protocol) that specify Network Media - Transmission media consist of materials or substances capable of carrying one or more signals 2 types of media Physical (guided) 1. Twisted Pair Cable 2. Coaxial Cable 3. Fibre optic Wireless (unguided) 1. Infrared 2. Broadcast Radio 3. Microwaves Twisted Pair Cable - It consists of pairs of twisted copper cable bundled together The twisted wire help cancel out the electromagnetic interference from external source Higher the level, greater the bandwidth of the cable Coaxial Cable A core of wire (either solid or stranded) surrounded by: - Insulating material (to separate the core from the shield) A shield (to shield from EMI) Plastic outer jacket Fibre optic cable - Contains one or many thin strands of glass or plastic Uses total internal reflection to transmit signals using light Wireless medium - Falls within the electromagnetic spectrum