The document discusses various ways that data integrity and security can be compromised and methods that can be used to protect data integrity and security. It covers topics like passwords, encryption, firewalls, biometric security, and the risks of viruses and unauthorized access.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
32 views19 pages
Computer System Security
The document discusses various ways that data integrity and security can be compromised and methods that can be used to protect data integrity and security. It covers topics like passwords, encryption, firewalls, biometric security, and the risks of viruses and unauthorized access.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 19
Many companies have lost millions of dollars
because of corrupted data, lost data and
computer down time. This gave rise to the need of security of data because all the above occurred because of cyber crime in most instances. It refers to the validity of data, this means data being complete and accurate even after processing. Data security means keeping it safe. Data integrity can be compromised in several ways that is why there is need for security. Some of the ways are: Inaccurate data entry Viruses Hardware malfunction Natural disasters like flood and fire Accidental or malicious deletion of data Data integrity is mainly compromised by individuals who access a network illegally and by virus infections that are normally spread from one computer to the other. Different individual would want to access and sometimes corrupt the critical data held by a company. The individuals involved in computer crimes are classified as follows: Hacker: a hacker only accesses a network illegally just to view critical information Cracker: accesses the network illegally with the intention to destroy data, steal information and other malicious acts. Script kiddie: mostly teenagers who use pre written cracking programs Unauthorized access of different networks needed to be controlled so designers developed means of securing different networks from such. The use of passwords was introduced One can even restrict access to a file by means of a password. Data can also be encrypted or scrambled. Firewalls have been introduced as well Possessed objects-Access cards Biometric devices- Fingerprint, Iris, tongue print. Most of the systems today are accessed through the use of usernames and passwords. A password has to be something that you can easily remember and so it can be predictable to the people who know since people normally use their birthdates, their spouse name etc A password has to be long for it to be difficult to crack, the shorter the password the easier it will be to predict. Though they serve their purpose there are loopholes as mentioned above Each file can be protected using a password to open it and to modify it. In the save as window there is where it’s written tools and an arrow facing down, when that arrow is clicked a drop down menu comes and in this menu there is security options. This is a feature that was made by Microsoft for its application programs like word, PowerPoint. This method does not require a password to delete a file so without backup the data can be lost. Data in here is scrambled or encoded so that whoever access it illegally cannot be able to read it or make sense out of it. For this data to be readable it has to be
decoded with an encryption key which will
be held by the right person to access the data. It does not necessarily avoid crackers to
access the file but even if they do they wont
make sense out of the data. This can be either a software of hardware that is connected to a network and its main function is to filter the data that gets in to a system before it gets in. Some examples are black ice and MacAfee Here security is ensured by giving legitimate users objects like the access cards and ATM cards to be able to use the system. If this object gets lost, for example an access card other people can take it and be able to access the system and do whatever they one and it will appear as if the are legitimate users. These are machines that are able to give access to a user by scanning the iris, the finger prints, voice recognition and the face. Biometric devices are good but they can
sometimes deny the rightful user access.
Cut finger, swollen face or eye etc It is a malicious logic program that run without the user’s knowledge to alter the computer operations and destroy files. A computer can also be infected by a
program that replicates itself to use
resources like memory and might end up shutting down the computer called a worm. Screen displaying unusual messages mostly insults. Existing files disappearing without being deleted by the user. Programs not working well like failing to load. Unknown files mysteriously Unusual sounds and music. Programs closing without any input from the user Viruses normally spread by the use of disks from one computer to the other and the internet. If you use a memory stick on an infected computer the virus saves itself in this disk and then when you insert this removable disk in another computer the virus is transferred to this other computer sometimes even before you open any file On the internet the viruses are spread through the free software and executable files. Whenever you run any program or file that is infected the virus is spread. Connecting an unprotected computer to a network is also very risky. Opening mail from unknown senders also can help to spread viruses. Softwares that come accompanying books DO NOT OPEN MAIL FROM AN UNKNOWN SENDER Do not open files from the internet with these extensions exe, vbs. If the computer is already infected that use an antivirus to delete the virus and heal the infected files. An antivirus is a software that has virus definitions or signatures and needs to updated regularly to be effective. This is because the people who invent virus come with new ones almost on daily basis so if your antivirus is not up to date then it can not detect new versions of the virus thus it will reside with the virus and your files will be destroyed. This means protecting the physical parts of the computer or hardware. Lock computer cables Lock doors Install alarm system Use access cards to grant a user access to the computer lab Air condition the room Install cameras Note serial numbers because that’s what can be used to find a stolen computer Use fire proof doors There was a data protection act that was passed back in 1998 and it states that: • Data must not be used for any purpose other than what it is intended • Data must be updated to maintain integrity • Individuals have a right to check data held about them • Protection from unauthorised access and use