chapter 6 part1
chapter 6 part1
Define security:
• Security is a system that is used to protect a computer system and data.
• Security protect a computer system and data from intentional or accidental damage.
• It also protect the computer system and data from unauthorized person.
• What you have: The user may have a key, badge, token or plastic card to get physical access to the server
room or computer building.
• What you know: The 'user may have to enter user ID and password to logon into the machine.
• What you do: The user may enter signatures on the documents to confirm that they are authorized users.
• What you are: The user may be checked through biometrics. It is a means of biological identification such as
fingerprints, voice recognition, eye retina etc.
Virus:
• A virus is program that may disturb the normal working of a computer system.
• Virus attaches itself to files stored on memory and email attachment.
• A file containing a virus is called infected file.
Causes of computer virus :
A virus is spread on different computers due to the following reasons:
1. Email:
Virus can spread if the user opens and downloads an email containing a virus. Most of the viruses are spread
through email messages.
2. Networks:
Virus can spread if the user connects with a computer network that contains virus.
3. Removable Storage Media:
Floppy disks, CDs and flash devices are important means of exchanging data. A virus can also be transferred with
the files when a user copies data from one computer to another.
4. Pirated Software
The illegal copy of software is called pirated software. Virus can spread if the user installs pirated software that
contains virus.
How can we protect-the computer system from a virus:
A computer system can be protected from viruses by following these precautions:
• Freeware and shareware software from the Internet normally contain viruses. It is important to check the
1. Intentional Threats:
A user can intentionally delete important data. The intentional threats may occur for the following reasons:
2. Unintentional Threats
The unintentional threats to data security are as follows:
• An authorized user of data may delete or change the sensitive data accidentally.
• The data protection defines the laws that ensure data protection.
• The data protection legislation of different countries is based on same basic principles of Data Protection Act.
• The purpose of keeping personal data must be clearly defined by that organization that obtains the data.
• The individual about whom data is collected must be informed about the identity of the organization or individual
that collects data.
Some important privacy acts:
Some important privacy acts are as follows:
The 1986 Privacy Act prohibits agents of federal government from making unannounced searches of press
office.
1984 Cable Communications Policy Act restricts cable companies in the collection and sharing of information
about their customers.
“Data Protection Act 1934 protects an individual from unauthorized use and disclosure of personal information
stored on computer.
It consists of the following eight principles:
i. The information in personal data shall be obtained and processed fairly and lawfully.
ii. Personal data shall be held only for the specified and lawful purposes.
iii. Personal data shall not be used or disclosed for unspecified purpose.
iv. Personal data shall be adequate and relevant in the specified purpose. It should not be excessive in
relation to that purpose.
v. Personal data shall be accurate and must be kept up to date.
vi. Personal data shall not be kept for longer than is necessary for the specified purposes
vii. An individual shall have the right to be informed about his personal data without undue delay. He shall
also be entitled to access, correct or erase data.
viii. Appropriate security measures shall be taken against unauthorized access, or alteration, disclosure,
accidental loss, or destruction of personal data.
1987 Computer Security Act:
The 1987 Computer Security Act makes actions that affect the computer security Files and
telecommunication illegal.
1988 Video Privacy Protection Act:
1988 Video Privacy Protection Act prevents the disclosure of a person's video rental records without a court order
Matching and Privacy protection Act of 1988 prevents the government from comparing certain records to find a
match.
The Computer. Misuse Act 1990 makes provision to secure computer material against unauthorized access or
modification it was passed to deal the problem of hacking. The legislation recognized three key offences.
copyright act.
• Copyright Act 1976 is a principal law that governs software piracy.
• Some amendments were made in this act in 1983.
• Software piracy is now a punishable crime.
• The punishment may involve huge amounts of penalties.
• Software is an intellectual property of the person who develops it.
• He has the right to sell it in market.
• Software piracy deprives the developer from this right.
• Copyright act is used to punish the persons involved in software piracy.
Reasons of data loss.
Different reasons of data loss are as follows:
1. Sabotage: Damaging data deliberately is called sabotage. Any person may deliberately damage or delete the
data stored on the computer.
2. Machine Failure: The data stored on a computer may be lost due to failure of hardware. For example if the
hard disk is damaged the data stored on that hard disk will be lost.
3. Software Error: Data can also be lost due to some technical defect or failure of some software running on the
computer.
5. Power Failure: Sudden break down of power or fluctuation in power may result in data loss.
What is password?
• Password is a secret word that is used to protect a computer system or program.
• The user has to type the password to access the computer system.
Purpose of Password:
• The purpose of password is to protect data stored on a computer.
• An unauthorized person cannot access a computer system or program that is protected by a password.
Purpose of Backup:
The purposes of taking backup of data are as follows:
• An important file can be deleted accidentally
• The user may overwrite data of existing file.
• A mechanical failure in computer may result in loss of data.
• A virus may damage the data stored on the computer.
• Computer system may be stolen by anybody.
• Computer system may be damaged due to fire or power failure.
Different types of backup?
1. Complete Backup
• Backup of all data on the hard disk is called complete backup.
• The advantage Of this backup is that the entire hard disk is backed-up.
2. Incremental Backup
• Incremental backup creates a copy of only the data that is newly created or modified since the last backup.
• The selection of media depends upon the nature and quantity of the data to be backed up.
• Floppy Disks
• Hard disk
• Zip Disk
• Magnetic Tape
• CD
• USB