6 - security, privacy and data integrity Flashcards
how to prevent data loss / restrict access
user accounts
passwords
firewalls
antivirus software
antispyware software
encryption
biometrics
user accounts
authenticate a user - control access rights
passwords
- should be hard to crack and changed frequently - run antispyware software - mix of cases, numbers, keyboard characters
firewalls
sits between the comp and a network and filters info in/ out - software or hardware or both
- Examines traffic
- Checks if data going in/out meets criteria
- Blocks traffic if it fails the criteria and warns of security issue
- Logs all incoming/ outgoing traffic
- Prevents access to undesirable sites (keeps a list of IPs)
- Helps prevent viruses/ hackers
- Warns the user if software is trying to access an external data source
antivirus software
- Checks software before its opened on comp
- Compares possible viruses against a database of known viruses
- Carries out heuristic checking
- Quarantines possible infected files
antispyware software
- detects and removes spyware programs that have been illegally installed
encryption
- if a hacker accesses data without the encryption keys it cant decode the data
biometrics
- rely on unique human features eg fingerprints - compares ridges/valleys, retina scans - compare blood vessels in the retina
risks to data security
hacking
phishing
pharming
malware
- viruses
- worms
- logic bombs
- Trojan horses
- bots
- spyware
malicious vs ethical hacking
Malicious hacking - illegal access to a comp system without users permission or knowledge - intent of deleting altering, corrupting files or to gain personal details
Ethical hacking - authorised by companies to check their security and how robust the system is
virus
- replicate themselves with the intent to delete or corrupt files causing malfunction
worm
can replicate themselves with the intent of spreading to other comps - use networks to find weak comps
logic bomb
embedded in a program on a comp - when conditioned are met they are activated to delete files or send data to hackers
trojan horses
disguised as legitimate software
bots
Not always harmful- can search automatically for an item on the internet- can cause harm by taking control over a computer system and launching attacks
spyware
gathers information by monitoring then sending it back to the hacker eg key presses
phishing
- Someone sends legitimate emails
- May contain links
- Take user to fake website
- Trick user into entering personal data
phishing - how to prevent
○ Make users aware of new scams
○ Don’t click unsafe links
○ Run anti-phishing toolbars on web browsers
○ Look for https in address
○ Check accounts and change passwords regularly
○ Keep browser security up to date
○ Block pop ups