Unit 8 - Safety and Security
Unit 8 - Safety and Security
Failure to abide by these simple rules by anyone who holds data about individuals can lead to a heavy fine or even
imprisonment.
There are general guidelines about how to stop data being obtained unlawfully:
• Do not leave personal information lying around on a desk when not attended
• Lock filing cabinets at the end of the day or when the room is unoccupied
• Do not leave data on a computer monitor if it is unattended; log off from the computer if away from your desk for any
length of time
• Use passwords and user ids, which should be kept secure; passwords should be difficult to guess/break and should be
changed frequently (see earlier notes on passwords)
• Make sure that anything sent in an email or fax (including attachments) is not of a sensitive nature.
Personal data refers to any data concerning a living person who can be identified from the data itself or from the data in
conjunction with other information.
Examples of personal data include: name, address or email address, an ID card number/passport number, IP address, a
mobile phone, date of birth, banking details, photographs of the individual like in full school uniform.
Sensitive personal data ethnicity or race, political views, membership of a political party, membership of a trade
union, religion/philosophical beliefs, sexual orientation/gender, criminal record, medical history, genetic data/DNA,
biometric data. 2
8.2 e-Safety :
E-Safety It refers to the benefits, risks and responsibilities when using ICT. It is often defined to be the safe and
responsible use of technology. In particular being responsible when using the internet, sending and receiving emails,
taking part in social media & online gaming.
4
8.2 e-Safety :
Social media : Dangers/awareness and protection
Do not publicly post or give out personal information to people you do not know, including email addresses or house
addresses, because this could be used to find information about you or carry out identity theft.
Do not send out photos of yourelf to people you do not know; again this could lead to identity theft or somebody
impersonating you
Always make sure you use the privacy settings when posting photos of yourself on social media sites, so that only
people you trust can see them.
It is important that none of the photos you post can link you to a place or an address (for example, it is not a good
idea to show the number plate on a car because it is possible to find your address from this information).
Particular care should be taken not to post photos of yourself in some form of school uniform; again, this gives
somebody information about where they can find you.
Always maintain privacy settings to stop ‘non-friends’ from contacting you and also make sure you control who has
access to your profile.
Only make friends with people you know or are very well-known to other friends.
Avoid using, or forwarding messages containing, inappropriate language.
It is extremely important to be very vigilant when using social networking sites, instant messaging or chat rooms:
• Block or report anybody who acts suspiciously or uses inappropriate language.
• Be very careful with the language used in chat rooms:
– Always use a nickname and NEVER your real name
– Keep private and personal data secret.
• Do not enter private chat rooms – stay in public spaces (the danger signs are if someone wants to enter a private
chat room, asks you to instant message or email, requests your telephone number or even suggests that you
meet).
• Never arrange to meet anyone on your own, always tell an adult first and meet the person in a public place.
• Avoid the misuse of images, including forwarding on other images from other people.
• Always respect people’s confidentiality.
5
8.3 Security of data : Data threats
Risk Description Effect of the security Methods to remove the security risk
• The misuse of personal • Use of firewalls
information • Use of strong (frequently changed)
This is the act of gaining unauthorised/
Hacking • Data can be deleted, passwords and user IDs
illegal access to a computer system
changed or corrupted • Use of anti-hacking software
on a user’s computer • Use of user IDs and passwords
The creator sends out legitimate-looking
emails • Many ISPs or web browsers filter
to target users. As soon as the recipient out phishing emails
clicks on a link in the email or attachment, • Users should always be cautious
they are when opening emails or
Phishing
sent to a fake website or they are fooled • The creator of the email attachments
into giving personal data in replying to the can gain personal data, • Don’t click on executable
email. The email often appears to come such as bank account attachments that end in .exe, .bat,
from a trusted source, such as a bank or data or credit .com or .php, for example
well-known service provider • card numbers, from the
It uses the SMS system of mobile phones user
to send out fake text messages looks like • This can lead to fraud or
Smishing identity theft
from a legitimate sender. They contain a
‘SMS • Do not click any link shown on SMS.
URL or telephone number embedded in
phishing’.
the text message. The rest same as
phishing
8
8.3 Security of data : Card Fraud
Methods:
shoulder surfing : Criminals steal personal information from a victim when they are using a cash dispensing machine, when
paying for goods/services using a handheld point-of-sale device or even when paying using a smartphone. Example:
somebody watching you key in data, such as your PIN at ATM or by using a digital camera secretly placed near ATM. This
can be avoided by covering the keyboard with your other hand so that no-one can see which keys you are pressing.
card cloning : Copying of a credit or debit card which uses a magnetic stripe. Here an electronic device known as a
skimmer is used. This is a data capture device that allows a criminal to record all of the data stored on the magnetic stripe
on a card. Skimmers can be placed in ATM slots where they can read all the data from a card. To overcome this problem,
the card with microchip was used.
Shimmer: This uses a paper-thin shim (that contains a chip and a flash drive) that can be put into a card reading slot.
It is so thin that it is almost impossible to detect. When a customer puts their card into the reader slot, the shim reads all
the data from the credit/debit card, allowing the criminal to create a fake replica credit/debit card. Although the chip
itself cannot be cloned, all the data gathered from the cloned card is now stored on a magnetic stripe and a fake card is
produced.
To prevent card fraud, best way to check on this type of fraud is to do regular checks of your spending and query any
unusual activity.
Protection of data
Authentication is used to verify that data comes from a secure and trusted source. Along with encryption it strengthens
internet security. Methods used are:
Biometrics: It relies on unique characteristics of human beings. Biometrics data is difficult to copy and requires the user to
be present so that this method of authentication can be used.
• Finger print Scans: Users will have press their finger against the scanner. Finger prints are compared against those
stored in the database.
• Retina/Iris Recognition: Scans use infrared light to scan unique patterns of blood vessels in the retina.
• Face Recognition: Physical facial features are scanned and compared to the information held in the database.
• Voice Recognition: User will use speak which will compare the voice to one held on the database.
9
8.3 Security of data : Biometric technique
Method Advantages Disadvantages
Secure sockets layer (SSL) : It is a type of protocol that allows data to be sent and received securely over the internet.
When a user logs onto a website, SSL encrypts the data – only the user’s computer and the web server are able to make
sense of what is being transmitted. A user will know if SSL is being applied when they see https as part of the website
address or the small padlock in the status bar at the top of the screen.
The address window in the browser when https protocol is being applied, rather than just http protocol, is quite different:
Using https: secure https://www.xxxx.org/documents Using http: http://www.yyyy.co.uk/documents
SSL certificates are small data files that digitally bind an encryption key to an organisation’s details. When installed on a
web server, it shows as the green padlock and the https protocol ensures secure connections from a web server to a
web browser. How it works? The web server If the web browser can Once this message is
The user’s web browser The web browser responds by authenticate this received, the web server
sends a message so that requests that the sending a copy of certificate, it sends a acknowledges the web
it can connect with the web server its SSL certificate message back to the browser and the
required website, which identifies itself to the user’s web web server to allow SSL-encrypted two-way
is secured by SSL browser communication to begin data transfer begins 11
8.3 Security of data :
Encryption: It makes the data meaningless unless the recipient has the necessary decryption. It uses a secret key that has
the capability of altering the characters in a message. If this key is applied to a message, its content is changed, which
makes it unreadable unless the recipient also has the same secret key. When this secret key is applied to the encrypted
message, it decodes it, allowing it to be read. When a message undergoes encryption it is known as cypher script; the
original message is known as plain text.
Applications of encryption:
• Due to the risks of pharming, hacking or spyware, it is important that data stored on HDDs or SSDs is encrypted; if
data is then accessed illegally, it will be unreadable to the cybercriminal.
• Encryption of emails is also important
• Any data stored on the cloud should also be encrypted
Firewalls : A firewall can be software or hardware. It sits between the user’s computer and an external network. It can
also be called as a gateway. It will help to keep potentially destructive forces away from a user’s computer, by filtering
incoming and outgoing network traffic. The criteria for allowing or denying access to a computer can be set by the user.
Tasks carried out by a firewall:
It examines the ‘traffic’ between user’s computer and a public network
Checks whether incoming or outgoing data meets a given set of criteria, if the data fails the criteria, the firewall will
block the ‘traffic’ and give the user a warning that there may be a security issue
The firewall can be used to log all incoming and outgoing ‘traffic’ to allow later interrogation by the user
Criteria can be set so that the firewall prevents access to certain undesirable sites; the firewall can keep a list of all
undesirable IP addresses
It is possible for firewalls to help prevent viruses or hackers entering the user’s computer
The user is warned if some software on their system is trying to access an external data source, the user is given the
option of allowing it to go ahead or request that such access is denied.
Two-factor authentication – two methods to verify : When a user makes an online purchase, using a credit/debit card as
payment method. User may enter a username and password to log into an account. But before a credit/debit card
payment, an OTP (one time password) is sent to the registered telephone number or the email id stored in the bank
account. If the user enters this OTP, the transaction is authorized. Assignement : Pages 216 to 218
12