Professional Documents
Culture Documents
(Unhu/
Ubuntu/ Vumunhu
Introduction
• Keeping data safe is extremely important for a number of reasons. It
may be personal data that you want to keep within your family or
your close friends, or commercial data, such as passwords and bank
account details, which need to be kept safe to protect your money.
• Data can be corrupted or deleted either through accidental damage
or through a malicious act.
Syllabus Objectives
1 Privacy and Data Integrity
2 System security
3 Cybercrime
4 Data backup
5 Disaster recovery plan
Subtopics
• Privacy
• • Data Integrity
• - Verification
• - Validation
• • System security
• • Cybercrime
• - Spoofing
• - Sniffing
• - Fraud
• • Hacking
Security and Ethics
• Data security refers to the means of protecting data from
unauthorised access and from deliberate or accidental loss. It
includes the safety of data from any form of hazard like floods, theft
of the computer, fire, etc.
Ethics
• Defined as moral principles that governs a person’s or a groups
behavior.
• Ethical behavior does not necessarily relate to law.
• Computer Ethics – is concerned with the standards of conduct
applying to the use of computers.
• Computer Ethics is defined as the branch of ethics which studies and
analyses social and ethical impact of information technology.
Privacy and Data Integrity
Visual Checking
• This is checking for errors by comparing entered data with the original
document (NOTE: this is not the same as proof reading!!). If the entered
data is similar with the source document, then it has been entered
correctly.
Verification Methods
• (c) Parity Checking
• This is used in determining whether data has been correctly transmitted between
computer devices or on a network. It uses parity bits to verify correctness of transmitted
data.
• Parity Bits: A parity bit is an extra bit (1 or 0) that is appended to the left of a byte to
make it even or odd depending on the method of parity checking being used. It is used in
checking for errors in a group of bits transferred within or between computers. Parity bits
are also used to determine if a block of data has been correctly transmitted over a
communication channel. It works in the following way:
• Using Odd Parity: The letter C is transmitted as 1000011. Since there are three 1s in
this byte, a 0 is added to the left so that the total for 1s is odd, thus making it 01000011.
The first 0 (underlined) is used as the parity bit.
• Using even parity: In even parity, a 1 would be appended to the left of the byte so that
the total number of ones is even, thus making it 1 1000011
Cybercrime
Cybercrime
• are any crime where a computer is the tool or target or both.
• In some cases, the computer may have been used in order to commit
the crime, and in other cases, the computer may have been the target
of the crime.
Syllabused Crimes
• - Spoofing
• - Sniffing
• - Fraud
Spoofing
Spoofing
• Spoofing is a type of cybercrime where an intruder attempts to gain
unauthorized access to a user's system or information by pretending
to be the user.
• Spoofing refers tricking or deceiving computer systems or other
computer users. This is typically done by hiding one's identity or
faking the identity of another user on the Internet.
• takes place when the attacker pretends to be someone else (or
another computer, device, etc.) on a network in order to trick other
computers, devices or people into performing legitimate actions or
giving up sensitive data
Types of Spoofing…
Type of Spoofing : Email Spoofing
• Email spoofing (or phishing), used by dishonest advertisers and
outright thieves, occurs when email is sent with falsified “From:”
entry to try and trick victims that the message is from a friend, their
bank, or some other legitimate source.
•
Email Spoofing
Sniffing
• Sniffing refers to the process used by attackers to capture network
traffic using a sniffer.
• Once the data being transferred is captured using a sniffer, the
contents can be analyzed. Sniffers are used by hackers to capture
sensitive network information, such as passwords, account
information etc.
Sniffing
Fraud
• Computer fraud is defined as any act using computers, the Internet,
Internet devices, and Internet service to take or alter electronic data, or to
gain unlawful use of a computer. (To commit Cybercrime)
• Examples of fraud include :
Distributing hoax emails
Accessing unauthorized computers
Engaging in data mining via spyware and malware
Hacking into computer systems to illegally access personal information,
such as credit cards or Social Security numbers
Sending computer viruses or worms with the intent to destroy or ruin
another party's computer or system.
Hacking
Hacking
• Is an act of obtaining unauthorised accessed to protected and secure
computer systems or network, usually using intelligent methods like
cracking passwords
• acking is identifying weakness in computer systems or networks to
exploit its weaknesses to gain access
Configuring a Firewall
Digital Signatures
Digital signatures allow us to verify the author, authenticate the message contents of a
digital document sent over a network.
Reasons or Benefits of Digital Signatures
• Authentication
• Digital signatures help to authenticate the sources of messages. For example, if a bank’s
branch office sends a message to central office, requesting for change in balance of an
account. If the central office could not authenticate that message is sent from an
authorized source, acting of such request could be a grave mistake.
• Integrity
• Once the message is signed, any change in the message would invalidate the signature.
• Non-repudiation
• By this property, any entity that has signed some information cannot at a later time deny
having signed it.
Digital Certificates
• Digital certificates, similar to identification cards, are electronic credentials
that are used to certify the online identities of individuals, organizations,
and computers. Certificates are issued and certified by CAs. PKIX-compliant
public key infrastructures support industry standard X.509 version 3
certificates.
• Functions Like a Traditional Identification Card
• Digital certificates function similarly to identification cards such as
passports and drivers' licenses. Identification cards are issued by
recognized government authorities. When someone requests an
identification card, a government authority verifies the identity of the
requester, certifies that the requester meets all requirements to receive
the card, and then issues the card.
• Benefits or importance in security(Similar To Digital Signatures)
Data Backup
Data Backup
• backups which is a process of saving data that can be over a network
or a computer.
• The main purpose is to recover the lost data from an unpredictable
event like deletion by mistake or file corruption which in many cases
is caused by a virus or natural disasters like fire or floods. An example
is Ransomware, which encrypts all your data when your computer
gets infected and the second is to roll back the data at a specific time
you want.
Backing Up - Secondary storage
media
• CD and DVD, Blue-Rays − They are used for home/personal usage
where people can store their documents, mainly personal or office
related documents because they have small capacities varying from
750MB to 50GB..
• Removable Devices − They are again for home usage (data,
documents, music, photos, movies) which can be a Removable USB or
external hard disks. Their capacities lately have increased a lot, they
vary from 2 GB to 2 TB
Secondary storage Media
Online Backup or Cloud Storage
Online Backup or Cloud Storage
• One of the biggest trend is online storage where the companies and users
can store their data somewhere in the cloud, and it is cheaper as well
rather than doing it all by yourself.
• There is also no need for any backup infrastructure and maintenance.