You are on page 1of 5

DATA SECURITY

Definition of data security


Data security is the protection of programs and data and information in computers and
communication systems, against unauthorized access, modification, destruction,
disclosure, or transfer, whether accidental or intentional

Security threats and control measures

A. Threats

A threat to a computer system can be defined as any unexpected occurrence, malicious or


otherwise, that can affect the assets and resources associated with a computer system.
i. Viruses
A computer virus is a destructive program that attaches itself to other files and
installs itself without permission on the computer when the files are opened for
use

Types of computer viruses


a) Boot sector virus
They destroy the booting information on storage devices

b) File virus
They attach themselves to files
c) Hoax virus
Come as emails with an attractive subject and launches itself when the
email is opened

d) Trojans
They perform undesirable activities in the background without user
knowledge

e) Worms
It sticks in the computer memory

f) Back doors
May be a Trojan or a worm that allow hidden access to a computer system
Sources of viruses
a) Pirated software’s
b) Contact with contaminated storage medias e.g. flash disk memory cards
floppy disks etc
c) Freeware and shareware
d) Infected proprietary software’s
e) Updates of software distributed via network
Virus symptoms

Kabete TTI @ Ireri……..


a) Programs taking long to load
b) Unusual error messages occurring more frequently
c) Less memory available than usual
d) Computer occasionally hanging due to 100% use of the processor
e) Files / programs disappearing mysteriously
f) Changes in disk IDs
g) Disk access seems exclusive for simple task
Control measures against viruses
a) Installing the latest version of Antivirus software on the computer
b) Avoid foreign external storage media like diskettes, flash disks etc
c) Avoid opening mail attachments before scanning them for viruses
d) Regular update of the Antivirus software
Reasons for updating the software:
 To update the virus definition file - this file contains the patterns
that they use to identify viruses. It tell the scanner what to look for
to spot a virus in the infected file
 To update the Antivirus software itself
Examples of antivirus softwares in the market
Escan, Avira, Mcafee, Norton, Avast ect.

ii. Unauthorized access


Physical access to computer system should be restricted to ensure that no
unauthorized person gets access to the system.

Unauthorized access may take the following form


a) Eavesdropping
This is tapping into the communication channel to get information
b) Surveillance
This is where a person may keep a profile of all computers activities done
by another person or persons. The gathered information may be used for
other illegal work e.g. spreading propaganda or sabotage
c) Industrial espionage
Spying your competitors to get information that you can use to counter or
finish the competitors
d) Getting sensitive information that one is not supposed to by mistake
e) Network access incase computers are networked and connected to the
external world
f) Strangers getting into computer rooms without the consent of owners
g) Forced entry into the computer rooms through weak access points

Control measures against unauthorized access


a) Encrypt the data and information during transmission
b) Enforce network security measures
c) Reinforce the weak access points like doors and windows with metal grills
and burglar alarms
d) Enforce data and information access control policies on all employees

Kabete TTI @ Ireri……..


e) Use file passwords
f) Keep computer rooms closed when not in use

iii. Computer errors and accidental access


Errors and accidental access to data and information may be as a result of people
experimenting with features they are not familiar with; also people might make
mistakes by printing sensitive reports and unsuspectingly giving them to
unauthorized person.

Control measures against Computer errors and accidental access


a) Give various files access privileges and roles to the end users and
technical staff in the organization
b) Set up a comprehensive error recovery strategy in the organization

iv. Theft
Theft plays a significant role in the loss or damage of data. Theft of data happens
within an organization with authorized personnel’s stealing data for one reason or
another

Control measures against theft


a) Employ guards to keep watch over data and information centre and
backups
b) Burglary proof the computer rooms
c) Reinforce the weak access points like doors and windows with metal grills
and padlocks
d) Create backups in locations away from the main computer centre

B. Computer crimes
It’s the illegal access, altering or duplication and use of data or information without the
consent of the legitimate owner.

They include
a) Trespass
This is the act of gaining access or entering into a computer system
without legal permission
b) Hacking
This refers to intention breaking of codes and passwords to gain
unauthorized access to computer system, data and information files. This
is done by a person called a hacker
c) Tapping
In this crime, a person sends an intelligent program on a host computer
that sends him information from the computer.
d) Cracking
This refers to the use of guess work over and over again by a person until
he /she finally discovers a weakness in the security policies or code of
software

Kabete TTI @ Ireri……..


e) Piracy
This is illegal duplication of copyrighted software’s, information or data
How to eliminate piracy
 Make the software cheap and affordable
 Set installation password to deter illegal installation
 Use licenses and certificates to identify originals
f) Fraud
This refers to the use of computers to cheat other people with the intension
of gaining money or information

g) Sabotage
This is illegal destruction of data and information with the aim of crippling
services delivery or causing a great loss to an organization

h) Alteration
This is illegal changing of data and information without permission with
an aim of gaining or misinforming the authorized users

Detection and protection of computer crimes


a) Audit trials
This refers to a careful study of an information system by experts in order
to establish or find out all the weaknesses in the system that could lead to
security threats and weak access points for trimesters

b) Data encryption
Data being transmitted over a network can be protected from unauthorized
access by mixing it up into a form that only the sender and the receiver
can be able to understand by reconstructing the original message from the
mix

c) Log files
They are special system files that keep a record (log) of events on the use
of the computer and the resources of the information system. The
information system administrator can therefore easily track who accessed
the system, when, and what they did on the system

d) Firewalls
It’s a device or a software system that filters the data and information
exchanged between different networks by enforcing the host and control
access policy. Firewall monitor and control access to and from protected
networks

Challenges / difficulties facing detection and protection of computer crimes

Kabete TTI @ Ireri……..


a) There are no witnesses
b) Computer crimes may lack clear trail of evidence leading to the guilty
party e.g. finger prints
c) The crime might be complex
d) Lack of knowledge by people in management and law to prevent the crime

Laws governing protection of information

a) Data and information should be up to date


b) Data and information should not be kept longer than necessary
c) Data and information should be kept secure against loss or exposure
d) Data and information should not be transferred to other country without the
owners permission
e) Data and information should be collected, used and kept for specified lawful
purpose

Kabete TTI @ Ireri……..

You might also like