0% found this document useful (0 votes)
143 views37 pages

Security Threats and Controls

Uploaded by

zeejmedi254
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
143 views37 pages

Security Threats and Controls

Uploaded by

zeejmedi254
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

Security threats and

controls
There is need to protect data from theft because it used to make
decisions in everyday life. Wrongful storage of data can lead to a
number of evil activities if it reaches malicious people
Data security core principles

MK SOLUTIONS
• The three core
principles of Confidentiality

data security
also referred to
as information
security are:
1. Confidentiality Information
security
2. Integrity and
3. Availability
Availability integrity

2
Confidentiality

MK SOLUTIONS
• This implies that sensitive data or information belonging to an
organization or government should not be accessed by or
disclosed to unauthorized people.
• Such data includes: office documents, chemical formula,
employee’s details, examinations etc.

Data security core principles


Integrity
• Integrity refers to a situation where data should not be
modified without owner’s authority

MK SOLUTIONS
4

Data security core principles


Availability

MK SOLUTIONS
• Information must be available on demand
• This translates to any information system and communication
link used to access it, must be efficient and functional. An
information system may be unavailable due to power outages,
hardware failures, unplanned upgrades or repairs

Data security core principles


Security Threats and
Control Measures
Security threats of private or confidential data includes
unauthorized access, alteration, malicious destruction of hardware,
software, data or network resources as well as sabotage.
The main objective of data security control measures is to provide
security, ensure integrity and safety of an information system
hardware, software and data
Information System Failure
Causes of computerized system failure include
1. Hardware failure due to improper use
2. Unstable power supply as a result of brownout or blackout
and vandalism

MK SOLUTIONS
3. Network breakdown
4. Natural disaster
5. Program failure
6. Computer virus attacks

7
Control measures against hardware failure

• Computer systems should be protected from brownout or


blackout which may cause physical damage or data loss by
using surge protectors and UPS
• Most organizations use Fault Tolerant Systems
• A fault tolerant system has redundant or duplicate storage,

MK SOLUTIONS
peripheral devices and software that provide a fail-over
capability to back up components in the event of system
failure
• Disaster recovery plans – involves establishing offsite storage
of an organization ‘s databases so that in case of disaster or
fire accidents, the company would have backup copies to
reconstruct lost data from.
8
Threats from malicious programs
• Malicious programs may affect the smooth running of a
system or carry out illegal activities such as, secretly collecting
information from an unknowing user. Some of the malicious
programs include:
1. Boot sector viruses

MK SOLUTIONS
2. File viruses
3. Hoax viruses
4. Trojan Horse
5. Worms
6. Backdoors

9
Malicious Programs Insight
1. Boot Sector Viruses 2. File Viruses
• They destroy the • Attach
booting themselves to

MK SOLUTIONS
information on files
storage media

10
Malicious Programs Insight
3. Hoax Viruses 4. Trojan Horse

• Come themselves • They appear to


as email with perform useful

MK SOLUTIONS
attractive functions but
messages and instead they
launch themselves perform other
when email is undesirable
opened activities in the
background. 11
Malicious Programs Insight
5. Worms 6. Backdoors
• This is a malicious • May be a Trojan or a
program that self- Worm that allows
replicates hence hidden access to a

MK SOLUTIONS
clogs the system computer system.
memory and storage
media

12
Control measures against theft
1. Employ security agents to keep watch over information
centers and restricted backup sites
2. Reinforce weak access points like the windows, door and
roofing with metallic grills and strong padlocks.
3. Motivate workers so that they feel a sense of belonging in

MK SOLUTIONS
order to make them proud and trusted custodians of the
company resources.
4. Insure the hardware resources with a reputable insurance
firm.
5. Encrypt and create strong passwords for your data and
access to computers
13
Piracy
• Piracy is a form of intellectual
property theft which means illegal
copying of software, information or

MK SOLUTIONS
data. Software, information and data
are protected by copyright and patent
laws

14
Control measures against piracy
• To reduce piracy:
1. Enforce laws that protect the owners of data
and information against piracy
2. Make software cheap enough to increase

MK SOLUTIONS
affordability
3. User licenses and certificates to identify
original software
4. Set installation passwords that deter illegal
installations of software
15
Fraud
• Fraud is a deception deliberately practiced in order to
secure unfair or unlawful gain
• Computer fraud is defined as any act using computers,
the Internet, Internet devices, and Internet services to

MK SOLUTIONS
defraud people, companies, or government agencies of
money, revenue, or Internet access. There are many
methods used to perform these illegal activities. Phishing
, social engineering, viruses, and DDoS attacks are fairly
well known tactics used to disrupt service or gain access
to another's funds.

16
Sabotage
• Refers to illegal destruction of
data and information with the
aim of crippling service

MK SOLUTIONS
delivery or causing great loss
to an organization.
17
Threats to piracy and confidentiality
• Privacy means that data or information
belonging to an individual should not be
accessed by or disclosed to other people. Its an
individual’s right to determine for themselves

MK SOLUTIONS
what should be communicated to others
• Confidentiality – is the sensitive data or
information belonging to an organization or
government. Should therefore not to be
accessed by or disclosed by unauthorized people
18
Computer crimes related to data privacy and security
1. Eavesdropping

This refers to tapping into


communication channels to get
information.

MK SOLUTIONS
Hackers use eavesdropping to access
private or confidential information
from internet users or from poorly
secured information systems
19
Computer crimes related to data privacy and security
2. Surveillance (monitoring)

This is the monitoring of computer


systems and networks using
background programs such as

MK SOLUTIONS
spyware, malware and cookies

20
Computer crimes related to data privacy and security
3) Industrial Espionage

This involves spying on a


competitor to get information that

MK SOLUTIONS
can be used to cripple the
competitor

21
Computer crimes related to data privacy and security
4) Hacking and Cracking

•Hacking is the process of gaining


unauthorized access into a system just
for fun and the person who hacks is

MK SOLUTIONS
called a hacker.
•Cracking is the process of gaining
unauthorized access into a system for
malicious reasons
22
Computer crimes related to data privacy and security
5) Alteration

•Alteration is the illegal


modification of private or

MK SOLUTIONS
confidential data and information
with the aim of misinforming
users.

23
Control Measures Against Unauthorized Access
Introduction

•To safeguard information, a


number of security measures

MK SOLUTIONS
should be put in place. This
include:

24
Control Measures Against Unauthorized Access
A. Firewall

•A firewall is a device or a software system that


filters the data and information exchanged
between different networks by enforcing the

MK SOLUTIONS
host networks access control policy.
•The main aim of a firewall is to monitor and
control access to or from protected networks
•People who do not have permission cannot
access the network and those within cannot
access firewall restricted sites outside their
25
networks
Control Measures Against Unauthorized Access
B. Data Encryption

•This is the process of mixing up data so that only the


sender and the receiver can understand with use of an
encryption key.
•The translation of data into a secret code. Encryption is

MK SOLUTIONS
the most effective way to achieve data security. To read
an encrypted file, you must have access to a secret key or
password that enables you to decrypt it. Unencrypted
data is called plain text ; encrypted data is referred to as
cipher text.
There are two main types of encryption: asymmetric
encryption (also called public-key encryption) and 26
symmetric encryption.
Control Measures Against Unauthorized Access
C. Security Monitors

•The are programs that monitor and keep a log file or


record of computer systems and protect them from
unauthorized access. E.g.
•Biometric Security

MK SOLUTIONS
This type of security takes the user’s attributes such as
voice, fingerprints and facial recognition.
•Other access Controls measures Include:-
 Enhancing a multilevel authentication policies such as
assigning users log on accounts, use of smart cards and
personal identification number (PIN)
27
Policies and laws governing information security

Introduction
• Laws, regulations and policies enacted are meant to regulate
and govern data processing and information security. Laws can
either exist as international laws enacted by ISO- International
Standardization Organization an ISF- Information Security

MK SOLUTIONS
Forum
• These are non-profit making organizations who also offer
research on best practices
• There are also locally enacted laws to control the IT sector by
Parliament and policies made by the ministry of Information
and Technology
• Examples of laws that exist include: 28
Policies and laws governing information security

ICT related acts in Kenya


• The science and Technology Act
• Cap. 250 of 1977

MK SOLUTIONS
• The Kenya Broadcasting Corporation Act of
1988
• The Kenya Communications Act of 1998
However these laws are not adequate to
address the current issues of IT and ICT 29
Policies and laws governing information security

Kenya ICT Policy


• The government has put in place the
ICT policy that seeks to address issues

MK SOLUTIONS
of privacy, e-security, ICT registration,
cyber crimes, ethical and moral
conduct, copyrights, intellectual
property rights and privacy
30
Policies and laws governing information security

United Kingdom Data Protection Act


1998
• This act protects an individual privacy.

MK SOLUTIONS
The act states that no processing of
information relating to individuals,
including the obtaining, holding, use
or disclosure of such information can
be done without owner’s consent. 31
Policies and laws governing information security

United Kingdom Computer Misuse Act


1990
• This act makes computer crimes such as

MK SOLUTIONS
hacking a criminal offence. The act has
become a model of many other countries
including Kenya, which they have used to
draft their own information security
regulations.
32
Policies and laws governing information security

Family Educational Rights and Privacy Act (USA)


• This law protects the privacy of srudent’s
education records. To release any information
from a student’s education record.

MK SOLUTIONS
Security Breach Notification Laws
• Most countries require businesses, nonprofit,
and state institutions, to notify consumers when
encrypted ‘personal information’ is
compromised, lost, or stolen.
33
Policies and laws governing information security

Copyright and Software Protection Laws


• Hardware and Software are protected by either national or
international Copyright, designs and patents laws or Acts.
• These laws seek to address:

MK SOLUTIONS
i. Data should not be disclosed to other people without the
owner’s permission
ii. Data and information should be kept secured against loss or
exposure
iii. Data and information should not be kept longer than
necessary
iv. Data and information should be accurate and up to date
v. Data and information should be collected, used and kept for 34
specified lawful purposes.
Review Questions

1. Differentiate between private and confidential data


2. Why is information a useful resource?
3. Explain any three threats to data and information
4. Give two control measures you would take to avoid

MK SOLUTIONS
unauthorized access to data and information
5. Explain the meaning of industrial espinionage
6. Differentiate between hacking and cracking with reference
to computer crimes
7. What reasons may lead to computer fraud?
8. Explain the term ‘information security’
9. Why would data and information on an externally linked
35
network not be said to be secure even after burglar proofing
a room?
Review Questions

10) How can piracy be prevented in regard to data and


information?
11) Define a computer virus
12) Give four general rules that must be observed to keep within
the law when working with data and information

MK SOLUTIONS
13) Explain two types of computer viruses
14) What is a program patch? Why are patches important?
15) Explain measures you would take to protect computers from
virus attacks
16) What is data alteration? Explain its effect an data
17) How can you control errors related to data and information?
36
Review Questions

18) Data and information security has recently become very


important. Explain why?
19) Explain eavesdropping with reference to computer crimes
20) Why use copyright laws for software data and information
necessary?

MK SOLUTIONS
37

You might also like