Data Security
Data Security
Confidentiality
This means that sensitive data or information belonging to an organisation or government should
not be accessed by or disclosed to unauthorized people.
Integrity
This means that data should not be modified without owner’s authority.
Data integrity is violated when a person accidentally or with malicious intent, erases or modifies
important files.
Availability
The information must be available on demand. This means that any information system and
communication link used to access it, must be efficient and functional.
An information system may be unavailable due to power outage, hardware failures, unplanned
upgrades or repairs.
1
Data & Computer security
4. Trojans – they appear to perform necessary functions, but perform other undesirable
activities in the background without the knowledge of the user.
5. Worms – viruses that stick in the computer memory.
6. Backdoors – may be a Trojan or Worm that allows hidden access to a computer system.
3
Data & Computer security
measures put in place such as passing passwords or finding weak access points to
software.
f). Accidental access
Sometimes threats to data and information, comes from peoples unknowingly giving out
information to strangers or unauthorised persons.
g). An employee who is not supposed to see some sensitive data gets it, either by mistake or
design.
h). Strangers who may stray into the computer room when nobody is using the computers.
i). Forced entry into the computer room through weak access points.
j). Network access in case the computers are networked & connected to the external world.
4). THEFT
The threat of theft of data & information, hardware & software is real. Some information is
so valuable such that business competitors or some governments can decide to pay somebody
a fortune so as to steal the information for them to use.
4
Data & Computer security
COMPUTER CRIMES
A computer crime is a deliberate theft or criminal destruction of computerized data.
The use of computer hardware, software, or data for illegal activities, e.g., stealing, forgery,
defrauding, etc.
Committing of illegal acts using a computer or against a computer system.
Tapping.
Tapping involves listening to a transmission line to gain a copy of the message being
transmitted.
Cracking.
Cracking is the use of guesswork by a person trying to look for a weakness in the security codes
of a software in order to get access to data & information.
These weak access points can only be sealed using special corrective programs called Patches,
which are prepared by the manufacturing company.
5
Data & Computer security
A program patch is a software update that when incorporated in the current software makes it
better.
NB: Cracking is usually done by people who have some idea of passwords or user names of the
authorized staff.
Piracy.
Software, information & data are protected by copyright laws. Piracy means making illegal
copies of copyrighted software, data, or information either for personal use or for re-sale.
Ways of reducing piracy:
i) Enact & enforce copyright laws that protect the owners of data & information against
piracy.
ii) Make software cheap enough to increase affordability.
iii) Use licenses and certificates of authenticity to identify originals.
iv) Set installation passwords that prevent illegal installation of software.
Fraud.
Fraud is the use of computers to conceal information or cheat other people with the intention of
gaining money or information.
Fraud may take the following forms:
a). Input manipulation:
Data input clerks can manipulate input transactions, e.g., they can create dummy (ghost)
employees on the Salary file or a ghost supplier on the Purchases file.
b). Production & use of fake documents:
Fraudsters can either be employees in the company or outsiders who are smart enough to defraud
unsuspecting people.
Reasons that may lead to computer fraud.
For economic gain (i.e., to gain money or information).
To gain respect (self-worth)
Security measures to prevent fraud:
i) Careful recruitment of staff.
ii) Set up a clear & firm management policy on crimes & frauds.
iii) Restrict access to computer room or terminal.
iv) Use transaction & fill logs to monitor access to sensitive areas of the system.
v) Monitor & investigate error logs and reports on regular basis.
vi) Carry out risk analysis to examine the exposure of the organization to possible fraud.
Sabotage.
Sabotage is the illegal or malicious destruction of the system, data or information by employees
or other people with grudges with the aim of crippling service delivery or causing great loss to an
organization.
Sabotage is usually carried out by discontented employees or those sent by competitors to cause
harm to the organization.
The following are some acts of saboteurs which can result in great damage to the computer
centres:
Using Magnets to mix up (mess up) codes on tapes.
Planting of bombs.
Cutting of communication lines.
6
Data & Computer security
Alteration.
Alteration is the illegal changing of stored data & information without permission with the aim
of gaining or misinforming the authorized users.
Alteration may take place through the following ways:
a). Program alteration:
This is done by people with excellent programming skills.
b). Alteration of data in a database:
This is normally done by authorized database users.
Security measures to prevent alteration:
i) Do not give data editing capabilities to anybody without vetting.
ii) The person altering the data may be forced to sign in order for the system to accept altering
the information.
Theft of computer time.
Employees may use the computers of an organization to do their own work, e.g., they may
produce publications for selling using the computers of the company.
Theft of data (i.e., commercial espionage).
Employees steal sensitive information or copy packages and sell them to outsiders or competitors
for profit.
This may lead to a leakage of important information, e.g., information on marketing strategies
used by the organization, research information, or medical reports.
Security monitors
These are programs that monitor and keep a log file or record of computer systems and protect
them from unauthorized access.
Biometric security
This is a growing form of unauthorized measure that takes the user’s attributes such as voice,
fingerprints and facial recognition.
The following are some examples of regulations and laws in Kenya, United Kingdom and USA
that govern data processing and information security.
i. ICT related Acts in Kenya.
ii. Kenya ICT policy
iii. United Kingdom Computer Misuse Act 1990.
iv. Family Education Rights and Privacy Act (USA)
v. Security Breach Notification Laws
vi. Copyright and Software protection laws.
The following rules must be observed in order to keep within the law when working with data
and information.
1. Data & information should be kept secure against loss or exposure.
2. Data & information should not be kept longer than necessary.
3. Data & information should be accurate and up-to-date.
4. Data & information should be collected, used & kept for specified lawful purposes (i.e., it
should not be used for unlawful gain).
8
Data & Computer security
5. The owner of the data has a right to know what data is held by the person or organization
having it.
6. Data should not be transferred to other countries without the owner’s permission.
7. Do not collect irrelevant and overly too much information for a purpose.
COMPUTER SECURITY
What is Computer security?
Safeguarding the computer & the related equipments from the risk of damage or fraud.
Protection of data & information against accidental or deliberate threats which might cause
unauthorised modification, disclosure, or destruction.
A computer system can only be claimed to be secure if precautions are taken to safeguard it
against damage or threats such as accidents, errors & omissions.
The security measures to be undertaken by the organization should be able to protect:
i) Computer hardware against damage.
ii) Data, information & programs against accidental alteration or deletion.
iii) Data & information against hazards.
iv) The computer against unauthorised use.
v) Data, information & programs against piracy or unauthorised copying.
vi) Data & programs used by the computer system against illegal or unauthorised modification.
vii) Storage media, e.g., diskettes, tapes, etc against accidental destruction.
viii) Policies of the organization.
ix) Buildings.
x) Accidental interruption of power supply or communication lines.
xi) Disclosure of confidential data or information.
xii) Ensure that both hardware & software have longer life span.
1). Fire.
Fire destroys data, information, software & hardware.
Security measures against fire:
Use fire-proof cabinets & lockable metal boxes for floppy disks.
Use of backups.
Install fire fighting equipments, e.g., fire extinguishers.
Have some detectors.
Training of fire-fighting officers.
Observe safety procedures, e.g., avoid smoking in the computer rooms.
Have well placed exit signs.
Contingency plans.
2). Water, floods & moisture.
This causes rusting of the metallic components of the computer.
Security measures against water, floods & moisture:
Set up computer rooms on higher grounds to avoid floods & humidity.
Avoid installing computer components in the basement.
There should be adequate drainage system.
Use water-proof ceilings & floors.
3). Lightening, electricity & electrical storms.
9
Data & Computer security
This causes power failure that can cause damage to data, which has not been transferred to
permanent storage devices.
Security measures:
Install facilities to control power fluctuations, e.g., use of Uninterrupted power source
(UPS)
Use power stabilizers.
Have standby power generators/sources.
Have lightening arresters in the building.
4). Excessive Heat or Temperature.
Excessive heat or temperature from the computer itself or from the surrounding environment
can destroy computer storage media or devices.
Security measures:
There should be efficient ventilation system.
Use a cooling system in the computer rooms, e.g., cooling fans & air conditioners.
5). Computer virus attack.
A virus is a rogue software program that spreads rampantly through computer systems,
destroying data or causing the system to break down.
Security measures against computer virus:
Make backup copies of software, and store the copies off-site.
Restrict access to programs & data on a ‘need-to-use’ basis.
Check all programs regularly for change of size, as this could be a sign of virus infiltration.
Be careful with ‘Shareware’ and ‘Freeware’ programs, as they are the major entry points
for viruses.
Make sure all purchased software is in its original sealed-disk containers.
6). Smoke and Dust.
Dust and Smoke particles settle on storage devices and may scratch them during Read/write
operation.
Security measures:
Have dust mats or carpets to prevent entry of dust.
Fit the computer room with special Curtains to reduce entry of dust particles.
Cover the devices with Dust covers when cleaning the room.
Remove shoes before entering the room to prevent dust.
7). Terrorist attack.
This includes activities such as:
Political terrorists,
Criminal type of activities,
Individuals with grudges, or
People intending to cause general destruction.
Security measures:
Hiring of security guards to control physical access to the building housing the computer
room.
Activities that can cause terrorism should be avoided, e.g., exploitation of workers.
Have double door & monitoring devices.
Use of policies.
System auditing / use of log files.
Use of passwords.
10
Data & Computer security
Punitive measures.
Encryption of data.
Use of firewalls.
Consult & co-operate with the Police and Fire authorities on potential risks.
8). People.
People threats include:
Carelessness.
Clumsiness.
Accidental deletion of data, information or programs.
Vandalism, i.e., theft or destruction of data, information or programs & hardware.
Piracy of copyrighted data & software.
Security measures against Carelessness & Clumsiness:
Better selection of personnel.
Have a good office layout.
Improve employee training and education.
Limit access to data and computers.
Regular backups.
Use of Undelete & Unformat utilities.
Security measures against Vandalism:
Should have a sensitive attitude to office behaviour.
Tighten security measures, e.g., install alarm systems, burglar-proof doors/windows, &
roofs).
Limit access to sensitive company information.
Use Keyboard lock on terminals used by authorised users.
Use of disk locks.
Punitive measures.
9). Earthquakes.
2. Computer viruses:
A computer virus destroys all the data files & programs in the computer memory by
interfering with the normal processes of the operating system.
Precautions against computer viruses:
a) Anti-virus software.
Use Antivirus software to detect & remove known viruses from infected files.
Some of the commonly used Antivirus software are: Dr. Solomon’s Toolkit, Norton
Antivirus, AVG Antivirus, PC-Cillin, etc
NB: The best way to prevent virus is to have a memory-resident antivirus software,
which will detect the virus before it can affect the system. This can be achieved by
installing a GUARD program in the RAM every time the computer boots up. Once in
the RAM, the antivirus software will automatically check diskettes inserted in the drives
& warn the user immediately if a disk is found to have a virus.
For an antivirus to be able to detect a virus, it must know its signature. Since virus
writers keep writing new viruses with new signatures all the time, it is recommended
that you update your antivirus product regularly so as to include the latest virus
signatures in the industry.
The Antivirus software installed in your computer should be enabled/activated at all
times.
You should also perform virus scans of your disks on a regular basis.
Evaluate the security procedures to ensure that the risk of future virus attack is
minimized.
12
Data & Computer security
3. Accidental erasure:
Commands such as DELETE & FORMAT can be dangerous to the computer if used
wrongly.
Both commands wipe out the information stored on the specified secondary storage media,
e.g., formatting the Hard disk (drive C:) will destroy all the software on that system.
Precautions against Accidental erasure:
a) Use of Undelete utilities.
Use the Undelete facilities in case you accidentally delete your files.
There are two Undelete facilities depending on the operating system you are using.
MS-DOS 6.0 Undelete facility:
To undelete at the DOS prompt, change to the drive & directory whose files were
deleted, then type, e.g.,
C:\>UNDELETE <directory that contain the deleted file>
A list of all deleted files will be displayed with the first letter missing. Type in the
first letter and the file will be recovered.
Norton utilities & PC Tools:
Norton utilities & PC Tools also have an undelete facility, which is similar to the
DOS Undelete facility.
Windows Recycle Bin:
The Recycle Bin temporarily stores all deleted files & can be used to recover your
files.
1. Double-click the Recycle Bin on the desktop.
2. Click on the files you want to undelete.
3. Click on File, choose Restore.
The Recycle Bin will restore all selected files to their original folders and disks.
NB: If you delete a file accidentally, don’t copy any files or install any applications to
the disk that contains the deleted file. If you write anything to the disk, you might
destroy parts of the deleted file, making it unrecoverable.
b) Use of Unformat utilities.
MS-DOS 6.0 has an Unformat facility which can be used to recover information stored
on disks that have been accidentally formatted.
c) Use of Backups.
All data must be backed up periodically either on diskettes, tapes or CDs so that in case
of any accidental loss, the backed up copy can be used to recover the data.
For small files, use the Copy command to make a copy of the data on a diskette. For
larger amounts of data, use the Backup command to copy the data to several diskettes or
to a tape drive.
14
Data & Computer security
Some computer security systems may generate an alarm if someone tries to use a fake
password.
NB: You should never use passwords that can easily be linked to you, e.g., your name,
birth date, or names of people close to you.
15