University of Cape Coast: College of Distance Education - Code Temasco Study Centre
University of Cape Coast: College of Distance Education - Code Temasco Study Centre
Integrity
Consistency includes protection against unauthorized changes (additions, deletions, alterations, etc.) to
data. The principle of integrity ensures that data is accurate and reliable and is not modified incorrectly,
whether accidentally or maliciously.
Availability
Availability is the protection of a system’s ability to make software systems and data fully available
when a user needs it (or at a specified time). The purpose of availability is to make the technology
infrastructure, the applications and the data available when they are needed for an organizational
process or for an organization’s customers.
Logical Control
Logical controls are preventative controls that apply information technology software’s and systems to
prohibit unwanted access to information within a computer system. Nonphysical access controls are
also referred to as logical controls. These will prevent information assets from being accessed
electronically.
Logical controls that can prevent access to an organizations informational asset include: Authentication
of unauthorized users from being permitted to access a company’s systems
1) User identification (e.g. username and passwords)
2) Password management
3) Network firewalls
Password is a secret sequence of characters used to authenticate and authorize access to a computer
system, network, or application. Passwords are a type of logical control, designed to ensure that only
authorized users can access sensitive information and resources.
Good passwords:
● must not be too short (otherwise brute-force guessing will soon open)
● should not be words found in a dictionary
● should be a mixture of uppercase, lowercase, letters and digits
● should not be easily guessable by people who know you (first names, birthdates)
● should not be hard to remember that you have to write down.
● are not written down
Biometric authentication
Biometric authentication is a technology that uses biological characteristics to verify a person’s identity
and grant access to secure systems or locations.
Biometric authentication uses unique physical or behavioral traits to verify individuals' identities.
Possessed Objects
Possessed Objects refer to physical items or devices that a user possesses to authenticate or authorize
access to a system, network, or application. Example of possessed objects is smart cards.
Physical Control
Physical control in information security systems control refers to the measures taken to prevent
unauthorized physical access to sensitive areas, devices, or media. It involves controlling and managing
physical access to:
Access control
Access control refers to the mechanisms and policies that regulate and manage access to sensitive
resources, data, and systems. It ensures that only authorized individuals, devices, or systems can
access, modify, or delete sensitive information.
Identification in information security systems refers to the process of claiming or declaring an identity,
which is typically the first step in the authentication process. It involves providing a username, ID
number, or other identifier to access a system, network, or application.
Authentication in information security systems is the process of verifying the identity of a user,
device, or system. It ensures that someone or something is who they claim to be, and it prevents
unauthorized access to sensitive resources, data, and systems.
Cryptography
Information security uses cryptography to transfer usable information into a form that renders it
unusable by anyone other than an authorized user. This is called encryption.
Spyware
Spyware in information systems security refers to a type of malicious software (malware) that is
designed to secretly monitor and collect personal or sensitive information about a user, organization, or
system. Spyware is often installed on a device without the user's knowledge or consent, and can be
used to:
Anti-spyware programs
Examples: Lavasoft’s Ad-Aware, Se and Patrick Kolla’s Spybot, Search & Destroy
Spam
spam is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at
once.
Virus
A virus in information systems security is a type of malicious software (malware) that replicates itself
by attaching to other programs or files on a computer.
TO AVOID VIRUS:
I. Treat all disks as though they are infected.
II. Install an antivirus program and keep its virus definition up to data.
III. Run your antivirus regularly.
SOFTWARE PIRACY:
It is the illegal copying of software program.
Intrusion Detection
Intrusion detection in information systems security is the process of monitoring and analyzing network
traffic, system logs, and other data to identify and alert on potential security threats in real-time. It
involves detecting and responding to unauthorized access, misuse, or abuse of computer systems,
networks, and data.
Intrusion detection systems (IDS) use various techniques to identify threats, including:
Intrusion prevention
Intrusion prevention in information systems security is the process of detecting and preventing
potential security threats in real-time, before they can cause harm.
The World Wide Web or the web is a particular part of the Internet with all cool content, resources, and
useful services. You can surf the Web with a piece of software called a Web browser. The most
popular Web browser today is Google Chrome. Other popular browsers are Microsoft Internet
Explorer, Mozilla Firefox, Opera Mini, and Apple’s Safari.
Components of Web
There are 3 components of the web:
1.Uniform Resource Locator (URL): It serves as a system for resources on the web. A uniform
resource locator (URL) is a reference to a resource that specifies the location of the resource on a
computer network and a mechanism for retrieving it.
3. HyperText Markup Language (HTML): This defines the structure, organization, and content of
the webpage. The HTML is the set of markup symbols or codes inserted into a file intended for display
on the Internet. The markup tells web browsers how to display a web page's words and images.
A Website is nothing more than a collection of Web pages (each in its computer file) residing on a host
computer. The host computer is connected full-time to the Internet so you can access the site and its
Web pages anytime you access the Internet.
The home page is the main page at a Web site, and it often serves as an opening screen that provides a
brief overview and menu of everything you can find at that site.
The address of a Web page is called a URL, which stands for uniform resource locator. Most URLs
start with http:// or https://, add a www. , continue with the name of the site, and end with a
.com/.org/.xyz
URL The uniform resource locator (URL) identifies a computer on the Internet.
The results page will show you how many results match your keyword or keywords and will also show
you related searches for your keyword or keywords. Each result contains a brief description and a link
to the website. If the website is not available, the search engine may have a saved version of that
website. This ‘out of date version can be viewed by selecting the ‘Cached Page’ command. Your
search may result in thousands of webpages. Each result page only contains a few results, to see the
rest you can select the links at the bottom of the page.
E-commerce is the buying and selling of goods and services over the internet.
E-commerce can be a substitute for brick-and-mortar stores, though some businesses choose to
maintain both. Almost anything can be purchased through e-commerce today.
An online transaction usually requires you to provide personal information such as username,
password, address, and bank account or credit card details.
Because there is a great deal of personal information exchanged in an online transaction, you must
ensure that the transactions are done securely and only on credible Websites.
Spreadsheet software
Spreadsheet software is a type of application that enables users to store, organize, and analyze data in a
tabular format.
Key Features:
1. Cells: The basic unit of storage, where data is entered and stored.
2. Rows and Columns: Data is organized into rows and columns, making it easy to read and analyze.
3. Formulas and Functions:
4. Charts and Graphs: Data can be visualized using various chart and graph options.
5. Data Analysis: Spreadsheet software often includes tools for data analysis, such as filtering, sorting,
and pivot tables.
6. Collaboration: Many spreadsheet software options allow for real-time collaboration and sharing.
Uses:
1. Budgeting and Financial Planning
2. Data Analysis and Visualization
3. Accounting and Bookkeeping
4. Scientific and Engineering Calculations
5. Business Intelligence and Reporting