Data Security
Data Security
Data Security
Definition planning, Development, and execution of security policies and procedures
to provide proper authentication, authorization, access, and auditing of data and
information assets
Sources of Data Security Requirements
Stakeholders
Government regulations
Proprietary business concerns
Legitimate access needs
Contractual obligations
Data Security Goals
Access
Entitlement Audit
The 4 As and E
Authorization Authentication
Data Integrity
In security, data security is the state of being whole, protected from improper
deletion, alteration or addition.
Encryption
The process of translating plain text into complex codes to hide privileged
information, verify
Four main methods of encryption:
Hash: Uses algorithms
Symmetric: same key for encryption and decryption (vpn, file encryption)
Asymmetric: Public key for encryption, private key for decryption.
Obfuscation or masking
What is Obfuscation ?
The appearance of the data is changed.
two types of data masking, Persistent and
Dynamic
Persistent data masking:
Permanently and irreversibly alters the data.
Dynamic data masking:
Makes changes to appearance of data to the end
user system without changing the underlying
data
Masking Methods
• Substitution
• Shuffling
• Temporal variance
• Value variance
• Nulling or deleting
• Randomization
• Encryption
• Expression masking
• Key masking
Common Terms of Network Security
• Backdoor: A hidden entry to a computer system by passing password requirements.
• Bot or Zombie: A workstation taken over by a Trojan, Virus, Phish or download of an
infected file.
• Cookie: Small data file an internet commerce website installs on a computers hard drive
to identify returning visitors and their preferences.
• Firewall: Software and/or hardware that filters network traffic to protect against
unauthorized access or attack.
• Perimeter: Boundary between organization system and outside .
• Virtual Private Network (VPN): Use the unsecured internet to create an encrypted
tunnel
• DMZ: De-militarised Zone. Located between the perimeter firewall and a firewall
between it and the internet.
Hacking/Hacker and Phishing
Hacking/Hacker
A hacker finds unknown pathways in complex computer systems. Can be good or bad:
• White Hat hacker (Western movies the hero always wore a white hat) finds
vulnerabilities which are fixed in the patches.
• Malicious hackers intentionally breach systems to steal information or do damage.
Social Threats to Security / Phishing
Involves direct communication to trick people to provide confidential information – Social
engineering. Phishing is the call or message.
Malware
Any malicious software created to damage, change or improperly access a computer or network.
Adware: Spyware that slips into the computer from an internet download. It monitors browsing and buying habits. Not
illegal.
Spyware: Any program that slips in without consent
Trojan Horse: A malicious program that enters the system embedded in legitimate software.
Virus: A program that attaches itself to an executable file, and delivers a destructive payload
Worm: A program built to reproduce and spread across a network by itself. Usually harms networks by consuming
bandwidth.
Malware Sources:
o Instant Messaging (IM)
o Social Networking Sites
o Spam
Data Security Tools
HTTPS: The web
Identity
Anti-Virus Software / address begins
Management
Security Software https:// a security
Technology
layer is present
Intrusion Detection
Firewalls
(IDS) and Prevention Metadata tracking
(Prevention)
Software (IPS)
Data
Masking/Encryption
Quiz
Question 1:
Business Growth of the Organization is one of the reason why the Data
Security function is carried out.
o True
o False
Question 3:
Spyware, Adware, Trojan Horse, Virus and Worm are all examples of
Malware.
o True
o False
Question 9:
A malware that gets hiddenly installed, when you install something else,
and records user's activities is called as:
o Adware
o Worm
o Trojan Horse
o Virus
o Spyware
Question 10