SECURITY AND ETHICS O Level
SECURITY AND ETHICS O Level
ETHICS
DEFINITION
DATA SECURITY:
methods taken to prevent unauthorised access to data and to recover
data if lost or corrupted.
KEY WORDS
Data privacy
Data stored about a person or an organisation must remain private
and unauthorised access to the data must be prevented – data
privacy is required.
This is achieved partly by data protection laws.
These laws vary from country to country, but all follow the same eight
guiding principles
LAW GUIDIG PRINCIPLES
User accounts
User accounts are used to authenticate a user (prove that a user is
who they say they are).
User accounts are used on both standalone and networked computers
in case the computer can be accessed by a number of people.
This is often done by a screen prompt asking for a username and
password:
User accounts control access rights
USE OF PASSWORDS
Use of passwords
Passwords are used to restrict access to data or systems.
They should be hard to crack and changed frequently to retain
security.
Passwords can also take the form of biometrics (such as on a mobile
phone, ). Passwords are also used, for example, when • accessing
email accounts • carrying out online banking or shopping •
accessing social networking sites.
CONT..
Digital signatures
Digital signatures protect data by providing a way of identifying the
sender of, for example, an email.
FIREWALLS
Use of firewalls
A firewall can be software or hardware.
It sits between the user’s computer and an external network (such as
the internet) and filters information in and out of the computer.
This allows the user to decide to allow communication with an
external source and warns a user that an external source is trying to
access their computer.
Firewalls are the primary defence to any computer system to protect
from hacking, malware (viruses and spyware), phishing and pharming
CONT….
Antivirus software
Running antivirus software in the background on a computer will
constantly check for virus attacks.
Although different types of antivirus software work in different ways,
they all • check software or files before they are run or loaded on a
computer
• compare possible viruses against a database of known viruses
• carry out heuristic checking (check software for behaviour that
could indicate a virus, which is useful if software is infected by a virus
not yet on the database)
CONT..
Anti-spyware software
Anti-spyware software detects and removes spyware programs
installed illegally on a user’s computer system.
The software is either based on rules (it looks for typical features
associated with spyware) or based on known file structures which can
identify common spyware programs
ENCRYPTION
Encryption
If data on a computer has been accessed illegally (by a hacker, for
example) it is possible to encrypt the data, making it virtually
impossible to understand without encryption keys to decode it.
This cannot stop a hacker from deleting the files, but it will stop them
using the data for themselves.
BIOMETRICS
Biometrics
In an attempt to stay one step ahead of hackers and malware writers,
many modern computer devices use biometrics as part of the
password system.
Biometrics rely on the unique characteristics of human beings.
Examples include fingerprint scans,
retina scans (pattern of blood capillary structure),
face recognition
and voice recognition
Risks to the security of stored data
Hacking
There are two types of hacking:
1.malicious and
2. ethical
MALICIOUS HACKING
VIRUSES
Programs or program code that can replicate and/or copy themselves
with the intention of deleting or corrupting files or causing the
computer to malfunction.
They need an active host program on the target computer or an
operating system that has already been infected before they can run.
Worms A type of stand-alone virus that can replicate themselves with
the intention of spreading to other computers; they often use
networks to search out computers with weak security.
Logic bombs Code embedded in a program on a computer. When
certain conditions are met (such as a specific date) they are activated
to carry out tasks such as deleting files or sending data to a hacker..
CONT…
Phishing
Phishing is when someone sends legitimate-looking emails to users.
They may contain links or attachments which, when clicked, take the
user to a fake website, or they may trick the user into responding
with personal data such as bank account details or credit card
numbers.
The email often appears to come from a trusted source such as a
bank or service provider.
The key is that the recipient has to carry out a task (click a link, for
example) before the phishing scam causes harm.
WAYS TO PREVENT PHISHING
• Look out for https and/or the green padlock symbol in the address
bar (both suggest that traffic to and from the website is encrypted).
• Regularly check online accounts and frequently change passwords.
• Ensure an up-to-date browser, with all of the latest security
upgrades, is running, and run a good firewall in the background at all
times. A combination of a desktop firewall (usually software) and a
network firewall (usually hardware) considerably reduces risk.
• Be wary of pop-ups – use the web browser to block them; if pop-
ups get through your defences, do not click on ‘cancel’ since this
often leads to phishing or pharming sites – the best option is to select
the small X in the top right hand corner of the pop-up window, which
closes it down.
PHARMING
Pharming
Pharming is malicious code installed on a user’s computer or on a
web server.
The code redirects the user to a fake website without their knowledge
(the user does not have to take any action, unlike phishing).
The creator of the malicious code can gain personal data such as
bank details from users. Often, the website appears to belong to a
trusted company and can lead to fraud or identity theft.
PROTECTION AGAINST PHARMING
Data recovery
It covers the potential impact on data caused by accidental mal-
operation, hardware malfunction and software malfunction.
In each case, the method of data recovery and safeguards to
minimise the risk are considered
CONT…
CONT…
DATA RECOVERY SOFTWARES