LO6 security and protection Flashcards
what are the three security principles? 6.1
confidentiality, integrity and availability
which act are the three security principles protected by? 6.1
data protection act 2018
what does it mean by confidentiality? 6.1
Information should only be accessed by individuals or groups with the authorisation to do so.
how to uphold confidentiality 6.1
protection measures like usernames and passwords = only authorised people can access the sensitive data. Tiered levels of access or permissions limit who has access to data.
what does it mean by integrity? 6.1
Information is maintained so that it is up to date and fit for purpose.
how to uphold integrity 6.1
regular data maintenance to update information (e.g. confirm contact details once a year). If storing data in a spreadsheet or database, record-locking should be used so that only one person can edit at a time, preventing the data from becoming incorrect.
what does it mean by availability? 6.1
Information is available to individuals or groups that need to use it. Only be available to the authorised.
how to uphold availability 6.1
staff = correct privileges to easily access data when required. Data could be stored online, e.g., in cloud storage = available remotely using an internet connection.
Data must be safe from unauthorised access. additional copies of information shouldn’t be made, can be lost or stolen.
name potential risks 6.2
unauthorised access to data, accidental loss of data, intentional destruction of data, intentional tampering with data
unauthorised access to data 6.2
data should only be viewed by individuals with authorisation, espionage and poor information management can occur due to unauthorised access.
Espionage = collecting data so that it can be used against an organisation - e.g. a competitor acquiring information about their rival’s product before it is launched publicly.
poor information management strategies = If in place and data is insecurely stored or too many people have access to sensitive information can probably be viewed by unauthorised persons.
accidental data loss 6.2
Data loss = information being irreversibly lost, copy and the original version so it cannot be accessed as any format. e.g. accidental data loss = equipment failure or a technical error can lead to data corruption, like a database crash or hard drive failure.
Human error = an employee might accidentally delete a file or discard an important paper document without realising it.
intentional destruction of data 6.2
= the act of purposely damaging an organisation by deleting or denying access to data. e.g. viruses that corrupt data so that it can no longer be used and targeted malicious attacks such as DDOS (distributed denial of service) attacks ransomware. Ransomware encrypts files so that they can only be accessed again when certain criteria have been met, usually, the affected group has to pay an extortionate fee.
intentional tampering with data 6.2
This is when data is changed and no longer accurate. This could occur through fraudulent activity such as hacking to change information displayed on a webpage. An example is if a student or teacher changed exam answers for a better grade. A business example is if a company tampered with financial data to display larger profits and smaller losses than real figures, to boost investment or please stakeholders.
what are some impacts when data is lost? 6.3
loss of intellectual property, loss of service and access, breach of confidential information, loss of third-party data, loss of reputation, identity theft, threat to national security
what is intellectual property? 6.3
anything that an organisation or individual has designed, developed or created themselves
impacts of intellectual property loss 6.3
The impact of having intellectual property lost depends on the property itself and how easy it would be for the victim to recreate or recollect the data. Competitors that stole intellectual property could use it to their advantage. Also, the effect of an upcoming announcement to the public would decrease if it was leaked ahead of time.
impacts of loss of service and access 6.3
If usernames and passwords are stolen = unable to access services that they have paid for
an example being if WIFI details were stolen so that a hacker can access the internet using someone else’s account. If a hacker is permitted access to a system they can change the account settings such as the password to lock out the original owners of that account, leaving them without access.
Other services can be targeted with malicious attacks like a DDOS attack so that users cannot log into a web page or online service. If users cannot access an account they may use alternative methods and providers, such as avoiding one type of cloud storage provider that has let them down and choosing another.
impacts of breaches of confidential information 6.3
Confidential information is highly sensitive and could lead to other negative impacts if it gets into the hands of unauthorised people. Confidential information, such as medical histories, should be stored securely with multiple physical and logical protections in place to ensure that it keeps its integrity.
If confidential information was breached then it could lead to a loss of reputation as the holder would be regarded as ineffective at protecting data. Legal consequences would also follow as the Data Protection Act 2018 would be broken; fines, court cases and imprisonment would be possible further impacts. An organisation would expect to see penalties from the information commissioner’s office if they failed to protect personal details by breaking the DPA.
impacts of the loss of third-party data 6.3
Many organisations will store data not only for their own purposes but for other individuals and businesses too; a key example being cloud storage providers. Users can store data on public cloud servers such as google drive or drop box ad access their information using the internet from any network device they please,
If services like cloud storage services are hacked or taken offline (e.g. because of an attack or network problems) and data is lost then customers, especially those that pay, will be furious. This will lead to a loss of reputation, trust and even legal proceedings if personal and sensitive data is lost. Larger businesses will use private cloud storage, hosted in data centres that they maintain themselves, to avoid relying on third parties.