0% found this document useful (0 votes)
7 views12 pages

Unit 4

Information Security encompasses practices and technologies to protect data from unauthorized access, ensuring confidentiality, integrity, and availability. It is crucial for protecting sensitive data, preventing cyber attacks, and ensuring business continuity. Common cyber threats include malware, phishing, and ransomware, necessitating strong security measures like encryption, firewalls, and regular software updates.

Uploaded by

Peter Parker
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views12 pages

Unit 4

Information Security encompasses practices and technologies to protect data from unauthorized access, ensuring confidentiality, integrity, and availability. It is crucial for protecting sensitive data, preventing cyber attacks, and ensuring business continuity. Common cyber threats include malware, phishing, and ransomware, necessitating strong security measures like encryption, firewalls, and regular software updates.

Uploaded by

Peter Parker
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 12

UNIT 4: INFORMATION SECURITY

INTRODUCTION TO COMPUTING

ICT 111

MR CHOLA A

http://chola07.github.io/chola-Resume/
INFORMATION SECURITY

Information Security refers to the practices, policies, and technologies


designed to protect digital and physical information from unauthorized
access, modification, destruction, or theft. It ensures the confidentiality,
integrity, and availability (CIA) of data in organizations, businesses, and
personal systems.
DATA, INFORMATION AND KNOWLEDGE
Data are raw facts. Data is isolated values which by themselves do not have much significance.
Data may be numbers, letters or characters, image represented as graphic images and pictures,
audio or video. It represents something in the real world. Data forms the raw material for the
production of information. Data is not organized and does not convey a meaning. For example, the
data elements like ‘24th’, ‘Oct’, 2012’, ‘Kitwe’, and ‘Independence Day’ just represent values.
Information is processed, manipulated, and interpreted data. It is the collection of data organized in
such a way that they have value beyond the data itself. Information is created by defining and
organizing relationships among data. For example, ‘The Independence Day celebrations will be
held in Kitwe on the 24th October, 2012”. The processed data gives us information which can be
used for different purposes.
Knowledge is an inference or conclusion drawn from the information. For example, a person from
Mongu who wishes to go to Kitwe can use the information ‘The Independence Day celebrations
will be held in Kitwe on the 24th October, 2025” to enhance his knowledge so that this person can
plan his trip to Kitwe accordingly.
THE CIA TRIAD IS THE FOUNDATION OF
INFORMATION SECURITY:
1.Confidentiality – Ensuring that only authorized users have access to data. Confidentiality
aspect specifies availability of information to only authorized users. In other words, it is the
protection of data from unauthorized disclosure. It requires ensuring the privacy of data
stored on a server or transmitted via a network, from being intercepted or stolen by
unauthorized users. Data encryption stores or transmits data, in a form that unauthorized
users cannot understand. Data encryption is used for ensuring confidentiality.
2.Integrity – Ensuring data is accurate and has not been altered by unauthorized individuals.
Integrity security aspect assures that the received data is exactly as sent by the sender, i.e.
the data has not been modified, duplicated, reordered, inserted or deleted before reaching
the intended recipient. The data received is the one actually sent and is not modified in
transit.
3.Availability – Ensuring that data and systems are accessible when needed.
ADDITIONAL SECURITY FEATURES
4. Authentication — Authentication is the process of ensuring and confirming the identity of
the user before revealing any information to the user. Authentication provides confidence in
the identity of the user or the entity connected. It also assures that the source of the received
data is as claimed. Authentication is facilitated by the use of username and password, smart
cards, biometric methods like retina scanning and fingerprints.
 Non-Repudiation prevents either sender or receiver from denying a transmitted message.
For a message that is transmitted, proofs are available that the message was sent by the
alleged sender and the message was received by the intended recipient. For example, if a
sender places an order for a certain product to be purchased in a particular quantity, the
receiver knows that it came from a specified sender. This helps to achieve Non-repudiation.
 Access Control — it is the prevention of unauthorized use of a resource. This specifies the
users who can have access to the resource, and what are the users permitted to do once
access is allowed.
IMPORTANCE OF INFORMATION SECURITY
Information security is very important for individuals, businesses, and
governments. It helps to:
1. Protect Sensitive Data
Prevents unauthorized access to personal, financial, and confidential business
data. Example: Protecting customer credit card information from hackers.
2. Prevent Cyber Attacks
Stops cybercriminals from hacking systems, stealing data, and causing financial
losses. Example: Preventing malware from corrupting organizational databases.
3. Ensure Business Continuity
Keeps IT systems running smoothly, preventing downtime and loss of productivity.
Example: A hospital needs secure systems to ensure uninterrupted medical
services.
IMPORTANCE OF INFORMATION SECURITY

4. Protect Privacy
Safeguards personal information from identity theft and fraud. Example:
Encryption protects emails from being intercepted.
5. Build Trust and Reputation
Organizations with strong security measures earn customer trust and
compliance with regulations. Example: Banks use encryption to secure online
transactions, ensuring customer confidence.
6. Ensure Legal and Regulatory Compliance
Businesses must comply with data protection laws such as GDPR, HIPAA, or PCI
DSS. Example: Companies failing to secure customer data may face legal
penalties.
POSSIBLE ATTACKS

Cybercriminals use various techniques to exploit weaknesses in computer


systems. Some common types of attacks include:
1. Malware Attacks
Malicious software or malware is a software code included into the system with
a purpose to harm the system. Malicious software designed to disrupt,
damage, or gain unauthorized access to systems. Example: A virus that
corrupts system files.
2. Phishing Attacks
• Definition: Phishing attacks use fake communication, such as an email, to
trick the receiver into opening it and carrying out the instructions inside,
such as providing a credit card number. . Example: An email pretending to
be from a bank requesting login details.
POSSIBLE ATTACKS
3. Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS)
Attacks: This is an attack were a system or network is overloaded with
excessive traffic, making it unavailable. Example: A website being flooded with
fake requests, causing downtime.
4. Ransomware Attacks
Definition: A type of malware that locks users out of their data until a ransom is
paid. Example: The WannaCry ransomware attack encrypted files on thousands of
computers worldwide.
5. Man-in-the-Middle (MitM) Attacks
Definition: An attacker intercepts communication between two parties to steal or
alter data. Example: Hackers capturing sensitive information over an unsecured Wi-
Fi network.
6. SQL Injection: Definition: Exploiting vulnerabilities in a database-driven
website by injecting malicious SQL queries. Example: An attacker inserting code
SECURITY MEASURES
To protect against cyber threats, organizations and individuals must implement strong
security measures.
1. Strong Authentication Methods: Use of Passwords: Strong, unique passwords
prevent unauthorized access. Multi-Factor Authentication (MFA): Requires additional
verification, such as fingerprints or OTPs.
2. Firewalls and Antivirus Software: Firewalls: Block unauthorized network access.
Antivirus Software: Detects and removes malware.
3. Data Encryption
• Definition: Converts data into unreadable code, only accessible with a decryption key.
Example: End-to-end encryption in messaging apps like WhatsApp.
4. Regular Software Updates and Patches
• Importance: Fixes security vulnerabilities in operating systems and applications.
Example: Windows releasing security updates to prevent malware attacks.
SECURITY MEASURES

5. Backup and Recovery


Regular Backups: Ensures critical data can be restored after an attack.
Example: Cloud backups prevent data loss in ransomware attacks.
6. Network Security Measures
Use of VPNs: Encrypts internet traffic to protect privacy. Secure Wi-Fi
Networks: Prevents unauthorized access.
THE END !

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy