Ch 6 Security - Copy
Ch 6 Security - Copy
• Data Integrity:
⚬ Ensures the accuracy and validity of data. This means the data received
is exactly as sent, without any alteration or corruption. Methods like
parity checks are used to verify that data has not been tampered with
during transmission.
• Data Privacy:
⚬ Maintains the confidentiality of data so that it is only accessible to
authorized individuals. This is crucial for personal data and sensitive
information that requires restricted access.
The Primary Concepts
• Security:
⚬ Encompasses overall measures to keep data safe and prevent data loss.
This includes strategies like regular data backups to safeguard against
data loss due to system failures or other incidents.
Protection Strategies
• Encryption:
⚬ Encryption is a process that uses algorithms to transform readable data
(plaintext) into a coded form (ciphertext) that is unreadable to
unauthorized users.
⚬ It scrambles the source code or data using an encryption key, making
the content inaccessible without the corresponding decryption key.
⚬ If a file encrypted with a strong encryption algorithm is accessed without
authorization, the contents will appear meaningless. To revert the data
back to its original form (decryption), the correct decryption key is
required, which is typically only known to the intended recipient or
authorized users.
Protection Strategies
• Data Backup
⚬ Involves creating and storing a copy of data in a separate location.
⚬ If the original data is lost, the backup can be utilized to restore the data,
ensuring data continuity.
• Disk Mirroring
⚬ Data is simultaneously stored on two separate disks.
⚬ If one disk fails, the system can continue to operate using the second
disk without data loss, providing real-time data redundancy.
Protection Strategies
• Firewall
⚬ A firewall is a security system that controls incoming and outgoing
network traffic.
⚬ It prevents unauthorized access to or from a private network and blocks
data packets from suspect sources.
⚬ Maintains a list of permitted or denied communications based on a set
of security rules.
⚬ Can be implemented in both hardware and software or a combination of
both.
⚬ Helps protect against cyber threats, such as hacking attempts.
The Backup Strategy
• User Account
⚬ A security feature requiring a username and password for system
access.
⚬ Resource access can be restricted to specific accounts, enhancing
control over who can see or modify data.
⚬ Ensures that systems and sensitive data cannot be accessed without
proper credentials.
Protection Strategies
• Anti-Malware
⚬ This software scans for and identifies malicious code, also known as
malware, which can be harmful to computer systems.
⚬ It has the capability to quarantine (isolate) or delete any detected
malware to prevent damage.
⚬ Regular scans can be scheduled to ensure continuous protection.
Protection Strategies
• Access Rights
⚬ Access rights can be set for individuals or groups to define what actions
they can perform on a system or with software, such as preventing
unauthorized editing of programs.
• Physical Measures
⚬ Physical security measures like locked doors or secure keyboards
prevent unauthorized physical access to computer systems.
Protection Strategies
• Up-to-Date Antivirus:
⚬ Ensures real-time protection against new threats by keeping the
antivirus definitions current.
• Strong Authentication:
⚬ Utilizing strong biometrics or passwords helps to verify a user's identity
and prevent unauthorized access.