IS Unit 4 Notes
IS Unit 4 Notes
Administering Security –
•Administering security means managing and maintaining safety measures to protect computer
systems, networks, and data from threats.
•It involves setting rules, using tools, and watching over systems to make sure everything stays
secure.
1. User Management
2. Access Control
3. Security Policies
Writing clear rules for data usage, passwords, software, and network access
Making sure everyone follows these policies
Phishing
Safe browsing
Reporting threats
Tools Used:
Firewalls
Antivirus
Intrusion Detection Systems (IDS)
Role-Based Access Control (RBAC)
Security Information and Event Management (SIEM)
Security Planning –
It helps ensure:
1. Identify Assets
Define what you want to protect and how secure it should be.
4. Create Policies
Passwords
User access
Data sharing
Software usage
Examples:
Antivirus, firewalls
Encryption
Backup systems
6. Train Users
Example:
A bank creates a security plan to:
•Risk analysis means checking what could go wrong, how serious it would be, and how to stop it. It
is a part of security planning.
This is exactly what risk analysis does in the world of computers, data, and networks.
It helps:
1. Identify Assets
2. Identify Threats
3. Identify Vulnerabilities
What weaknesses can be used by attackers?
Example: weak passwords, no antivirus, untrained staff.
4. Determine Likelihood
5. Estimate Impact
6. Calculate Risk
Example Scenario:
Qualitative Uses:- ratings like High, Medium, Low (no exact numbers)
Quantitative Uses :-numbers and money to measure risks
Security policies:
3. Password Policy
Rules for safe use of internet and email to avoid malware or phishing.
Example: "Do not open email attachments from unknown sources."
Clear goals
Defined roles and responsibilities
Step-by-step guidelines
Training for employees
Monitoring and regular updates
Example:
> "Teachers and students must not share login passwords. Any data saved on computers must be
backed up weekly."
IS unit 4 notes
•Physical security means protecting computers, servers, networks, and data from physical threats
such as:
It is the first layer of security in any organization—before cybersecurity tools like antivirus or
firewalls.
1. Access Control
2. Surveillance
4. Environmental Protection
5. Power Backup
Example:
In a bank:
•Legal issues in computer security refer to actions related to computers and data that violate the
law.
•These are covered under cyber laws and aim to protect systems, data, and users from misuse or
crime.
2. Data Theft
3. Software Piracy
4. Identity Theft
Using someone else’s personal information like Aadhaar, PAN, or credit card details without
permission.
Creating fake websites or emails to trick people into giving personal or financial information.
Privacy issues in computer security refer to the protection of a user’s personal and sensitive
information from being accessed, misused, or shared without permission.
Websites or apps collect personal data without telling the user or asking for permission.
2. Data Sharing
Companies share or sell user data to third parties without informing users.
3. Tracking
Websites track user activity using cookies or trackers to show ads or collect behavior data.
4. Lack of Encryption
If sensitive data is not encrypted, hackers can easily steal it during transfer or storage.
5.Data breaches
In India:
The IT Act 2000 provides some privacy protection.
The Digital Personal Data Protection (DPDP) Act 2023 aims to give users more control over
their data.
Ethical issues in computer security deal with what is right or wrong behavior when using
computers, networks, and data. These are not always illegal, but they may still be unfair or
harmful.
1. Unauthorized Access
Accessing someone’s files or accounts without permission, even if it's easy to do.
Collecting user data for one purpose, then using or selling it for something else.
6. Fake Identities
Using false names or fake accounts to hide real identity or fool others.
In Real Life:
Even if something is not illegal, it can still be ethically wrong. For example, spying on someone’s
online activity without telling them may not always break the law—but it breaks trust and privacy.
IS unit 4 notes
Protecting programs and data means using methods to prevent unauthorized access, misuse,
damage, or loss of software and information stored on computers and networks.
1. Authentication
2. Authorization
Gives specific access rights to users (e.g., read-only, edit, admin rights)
3. Access Control
Restricts who can access or modify files or programs using permissions and roles
4. Encryption
Converts data into unreadable form so even if it's stolen, it’s useless without the key
5. Backups
Software that detects and removes threats like viruses, worms, and spyware
7. Firewall
8. Audit Logs
9. Software Updates
"Information and the law" refers to the legal rules and regulations that govern how data and digital
information should be used, stored, protected, and shared in a safe and ethical way.
As more personal, financial, and confidential data is stored digitally, laws are needed to:
Protect privacy
Prevent cybercrimes
Ensure responsible use of data
Promote trust in digital systems
Protects original software, content, and inventions from copying or misuse. Includes:
Copyright
Patents
Trademarks
2. Cyber Laws
Laws created to handle online crimes like hacking, phishing, and data theft
In India: The Information Technology (IT) Act, 2000 handles most cyber-related crimes.
These laws ensure that users’ personal data is collected, stored, and used responsibly
India's recent law: Digital Personal Data Protection Act, 2023 (DPDP).
Make activities like unauthorized access, malware spreading, and network attacks illegal.
Data like emails, messages, and server logs are used as legal evidence in cybercrime cases.
Information security laws are created to protect data from theft, misuse, hacking, and privacy
violations. These laws ensure safe and legal use of information, especially in the digital world.
Key Provisions:
Key Highlights:
Protects software, content, videos, and images from unauthorized copying or sharing.
Software piracy is a legal offense.
GDPR (Europe) – General Data Protection Regulation: strict data protection law for citizens
of the EU.
HIPAA (USA) – Protects health-related data.
CCPA (USA) – Protects personal information of California residents.
To punish cybercriminals
To protect users’ privacy and data
To build trust in digital services
To encourage safe use of technology
In any organization that uses computers and digital systems, both employees and employers have
certain rights and responsibilities to maintain privacy, security, and ethical practices.
1. Rights of Employees:
a. Right to Privacy
Employees have the right to expect reasonable privacy in their emails, personal files, and
usage (if not violating policies).
Employers must inform employees if monitoring is being done.
Employees can expect safe access to systems, free from malware, spyware, or unauthorized
access.
Employees should not be blamed for accidental mistakes unless they violated clear security
policies knowingly.
Employees should have access to relevant tools and data needed for their job within security
limits.
e. Right to Whistleblow
Employees can report security breaches or unethical behavior without fear of punishment.
2. Rights of Employers:
Employers can monitor usage of company resources (emails, internet) to protect the system,
as long as it’s disclosed.
Employers can set rules about what can or cannot be done on company systems.
Employers have the right to encrypt, back up, and restrict access to company data.
If employees misuse systems, share passwords, or leak data, the employer can take legal or
disciplinary steps.
Software Failures
A software failure happens when a computer program does not work as expected. It may crash,
give wrong results, stop responding, or even create security problems.
Detailed Explanation:
When software is developed, it goes through coding, testing, and deployment. But sometimes, due
to mistakes or weak processes, it may contain bugs or errors. ThesHere’s a clear and exam-ready
explanation of:
1. Functional Failures:
2. Performance Failures:
3. Security Failures:
4. Compatibility Failures:
5. Recovery Failures:
2. Poor Testing
3. Incompatibility
Software may not work properly with certain devices, OS, or browsers.
4. Memory Issues
5. Incorrect Inputs
6. Security Vulnerabilities
New updates might break the existing system if not tested properly.
1. Poor coding
2. Lack of testing
3. Ignoring user input validation
4. Weak design
5. Improper handling of memory
Example:
In 2015, the British Airways check-in system failed because of a software issue. Flights were
delayed for hours and the company lost millions.
Computer Crime –
Computer crime (also called cybercrime) refers to any illegal activity that involves a computer, a
network, or both.
These crimes are committed to steal data, spread viruses, harm systems, or earn money illegally
using digital technology.
1. Hacking
2. Phishing
4. Identity Theft
6. Data Theft
Copying or stealing confidential data from companies or individuals.
8. Software Piracy
Financial loss
Identity and privacy loss
Emotional stress for victims
National or corporate security risks
Preventive Measures:
Strong passwords
Updated antivirus software
Don’t click unknown links or attachments
Use firewalls and secure networks
Be aware of online scams
Privacy refers to the right of individuals to control how their personal information is collected,
used, and shared.
1. Data Confidentiality:
2. Data Minimization:
Only the necessary amount of personal data should be collected.
3. User Consent:
Users can ask to view or delete their stored personal data (GDPR law supports this in
Europe).
Threats to Privacy:
Definition:
Ethical issues in computer security refer to the moral responsibilities and correct behavior related
to the use, protection, and access of computer systems and data.
2. Hacking
Breaking into computer systems or networks, even without causing harm, is unethical
Example: Bypassing passwords to enter a system.
4. Software Piracy
5. Plagiarism
6. Spreading Malware
7. Social Engineering
8. Lack of Accountability
🏢 Company: Facebook
📆 Year: 2019
🛑 What Happened:
In April 2019, security researchers from UpGuard discovered that user data from Facebook was
exposed publicly on Amazon Web Services (AWS) cloud servers.
The data was not leaked by Facebook directly, but by third-party developers who used Facebook’s
APIs and stored the data without proper protection.
🔒 Facebook’s Response:
Took down the exposed data after the issue was reported.
Promised to restrict third-party access to user data.
Launched “Data Abuse Bounty Program” to report misuse by app developers.
Updated its privacy and API access policies.
---
Lesson Explanation
Third-party risk management:- Companies must ensure partners follow strict data
protection rules.
Secure cloud storage:- All data stored on cloud must be encrypted and access-controlled.
Audit and monitoring :-Regular checks on developers and their data handling practices.
User control:- Users should know what data is shared and be able to control it.