Chapter 4 Security Privacy
Chapter 4 Security Privacy
Privacy
Data privacy is about data confidentiality and the rights of the individual
whom the data involve, how the data are used and with whom data can
legally be shared.
• Many personal and professional activities involves sensitive data that you
would not want to lose or accidental damage . Examples are financial data
or identify information about yourself or human research subjects. Again,
it is good to be aware of threats and protective measures.
Keep data secure
• Destruction
• Accidental damage
• Theft
• Espionage
Keep data private
• Salaries
• Medical information
• Social security numbers
• Bank balances
•.
Security in simple term is to care of the following
components
• Confidentiality
Access to systems or data is limited to authorized parties
• Integrity
When you ask for data, you get the “right” data
• Availability
The system or data is there when you want it.
Types of threats to data security
VIRUS
• Is a software program that finds its way into your computer without your
knowledge, often by attaching itself to a legitimate file or email message.
WORM
• Is a software program that uses the network to replicate itself on different
computer.
TROJAN HORSE
• Is a program that pretend to be as a kind application but is actually malicious
SPYWARE
• Is a program (it may be a trojan horse or it may be invisible to the user) that
collects information from your computer and transmits it remotely.
• INSTRUSION
• An outsider may gain access to your computer over the network ( for example by
guessing passwords or by tricking you into installing a trojan horse or spyware
program) so that this person can do anything you could do or worse anything the
system administrator could do.
A PHYSICAL ACCESS
• Any opponent who gains physical access to a computer has a great head start at
breaking into it. For example, you may leave your self logged in so the intruder can
masquerade as you without knowledge of your password. Or the intruder may
boot the computer with a removable disk and access your files.
HACKERS - Hackers are individuals who attempt to gain access to computer systems
illegally
• Even though you are protected , computer are vulnerable to anyone who wants to
edit, copy or delete files without the owners permission.
PHISHING
• Is a email fraud method in which the criminal sends out legitimate-looking email in
an attempt to gather personal and financial information from recipients
Precautions to prevent data security threats
• Always make sure that antivirus and other protection software is up
to date and turned on.
• Backup your data files and test your backups.
• Be careful when visiting websites especially if you are going to
download a file to your computer.
• Lock your computer when unattended
• Use software firewalls
• Use Strong Pass phrases/Password
• Never share your pass Phrase with others. If you suspect someone
knows your Pass Phrase.
• Use Email responsibly and protect sensitive data.
Accidental loss of data
In order to avoid losing information that was lost accidentally data should be
backed somewhere.
• Here are ways that you can back up data for future uses: