0% found this document useful (0 votes)
18 views18 pages

Data Security

The document outlines data security, defining key terms such as data, data privacy, and security threats, while highlighting challenges in protecting big data. It categorizes security threats, risks, and computer threats like viruses and spyware, and suggests protective measures against these threats. Additionally, it discusses the functions of the internet, email components, network configuration, and types of networks, emphasizing the advantages of computer networking.

Uploaded by

khasiroruth
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
18 views18 pages

Data Security

The document outlines data security, defining key terms such as data, data privacy, and security threats, while highlighting challenges in protecting big data. It categorizes security threats, risks, and computer threats like viruses and spyware, and suggests protective measures against these threats. Additionally, it discusses the functions of the internet, email components, network configuration, and types of networks, emphasizing the advantages of computer networking.

Uploaded by

khasiroruth
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 18

DATA SECURITY

Process of making sure data is available only


to those who need
it for legitimate purpose.
DEFINITION OF TERMS
• Data: This is the information that has been translated into a form that is efficient for
movement or processing.
• Data privacy privacy: The ability of an organization or individual to determine what
data in a computer system can be shared with third parties.
• Security threats: This is the process of an illegal entity gaining access to a company’s
data
or information.
• Control measures: This is any measure taken to eliminate or reduce the risk of security
threats.
• Cyber criminals: These are illegal users who use many different methods to lure you
into
parting with your confidential personal or business information.
Challenges to big data security and privacy

• Securing and protecting data in real time


• Data provenance
• Protecting access control method communication and
encryption:
Classification of security threats
• Classification according to type
•  Physical damage: For example, fire, floods
•  Natural events: For example, climate, volcanic
•  Compromise of information: Via eavesdropping, theft of media
•  Technical failures: For example, equipment, software
•  Compromise of functions and errors in use, abuse of rights
•  Classification according to origin
•  Deliberate: Aiming at information asset e.g. spying, illegal processing of data
•  Accidental: For example, equipment failure, software failure
•  Environmental: For example, natural event, loss of power supply
•  Negligence: Known but neglected factors compromising the network safety and
• sustainability.
CATEGORIES OF RISKS

 Damage: How bad would an attack be?


•  Reproducibility: How easy it is to reproduce the attack?
•  Exploitability: How much work is it to launch the attack?

•  Affected users: How many users will be impacted?


•  Discoverability: How easy it is to discover the threat?
COMPUTER THREATS AND VIRUSES
• Computer viruses: This is a small piece of software that can spread from one infected computer
to another.
• Trojan horse: Users can infect their computers with this software simply by downloading an
application they thought was legitimate but was infect or malicious.
• Malicious spyware: It is used to describe a Trojan application that was created by cyber criminals
to spy on their victims. An example would be a key logger software.
• Computer worm: This is a software program that can copy itself from one computer to another
without human interaction.
• Spam: In the security context, it is primarily used to describe unwanted messages in your email
box. Spam is a nuisance as it can clutter your mailbox.
• Pursing: Pursing scams are fraudulent attempts by cybercriminals to obtain private information.
Pursing scams often appear in the guise of email messages designed to appear as though they
are from legitimate sources.
• vii. Rootkit: This is a collection of tools that are used to obtain administrator-level access to a
computer or a network of computers.
PROTECTION AGAINST COMP THREATS

• Using strong passwords:


• Keep your software updated:
• Strengthen your network:
• Keep up to date on major security breaches: and change
your passwords immediately.
• Know that identity theft can happen anywhere
INTERNET AND EMAIL
• Internet: global interconnection of computers and computer networks to
facilitate global information transfer. It is an
interconnection of computers throughout the world.
• Email: This is a worldwide system for sending and receiving electronic
messages from one computer to another.
• HTTP (Hyper Text Transfer Protocol): This is a standard protocol for
communications between a web browser and a web server.
• Web browser: This is a program that lets the user browse through
information in the web.
• Intranet - Is an internal corporate network used in an organization to enable
the sharing of documents among coworkers.
• Extranet: It works in the same manners as intranet but provides information to
selected users outside the organization.
• Web pages: Documents published by organizations and individuals who are
interested in putting themselves on the web.
• Network configuration: This is the process of setting network controls, flow,
and
• operation to support the network communication of an organization and or
network owner.
• It is also known as network set up.
• World Wide Web (WWW): This is a global (international) system of connected
web pages containing information such as text, pictures, sound and video.
Components Required for an email

• A computer: Where you will send and receive email.


• An email program: Programs that let you send, receive
and manage email messages. They include Microsoft
outlook, outlook express, lotus notes and Eudora.
• Email addresses of the sender and the receiver.
• An internet service provider (ISP): Company who will
deliver your messages to the receiver.
creating an email

On the startup menu, point on the programs then click


outlook express.
On the tool’s menu click accounts.
In the internet account dialog box, click add button.
Select either mail or news to open the internet connection
wizard and then follow the instructions to establish a
connection with a mail or news server.
• Advantages of email
•  It is cheap and economical.
•  It is secure i.e. access can be restricted by a password.
•  It is faster i.e. emails can be sent instantly.
•  It is efficient i.e. messages prepared only once can be sent to
several users.
• Disadvantages of email
•  Initial installation cost is high.
•  Messages may be lost before they are read due to virus infection.
•  High cost of storage.
FUNCTIONS OF THE INTERNET
• Communication: Internet communication capabilities include sending and receiving
emails. You can send emails to your friends anywhere in the world, chat and send
instant messages.
• Information retrieval: The internet is a library. Thousands of books, magazines can
be read on the internet.
• Offering of information and products. You can find information, buy books online,
check what the weather is like anywhere in the world and so much more.
• Entertainment : people use internet to stream tv shows, movies and music.
• Education: people use internet to learn new skills through online courses, tutorials.
• Job searching:
• Remote work:
• Online shopping.
network configuration

• process of setting a network control, flow and operation to


support the network communication of an organization
and or network owner.
process of network configuration

• Router configuration: router (a device that passes data packets


between computer networks)information Specifies the correct IP
addresses(a unique numerical identifier for every device or
network that connects to the internet) and route setting.
• b) Host configuration: Sets up a network connection on a host
computer/laptop by logging the default network settings such as
IP addressing, proxy, network name.
• c) Software configuration: Any network-based software is
allowed access and provided with the appropriate credential to
monitor network traffic.
TYPES OF NETWORKS

• Peer-to-peer networks: They are commonly implemented where


less than 10 computers are involved and where strict security is
not necessary. All computers have the same status hence the
term “peer” and they communicate to each other on equal footing.
• Client/server networks: There are more suitable for larger
networks. A central computer or server acts as the storage
location for files and applications shared on the network. Usually,
the server is a higher than average performance computer.
• The server also controls the network access of the other
computer which are referred to as client computers.
ADVANTAGES OF COMPUTER NETWORKING

•  Speed
•  Cost
•  Resource sharing
•  Flexible access
•  Security.
WWW
• Web pages: Documents published by an organization and individuals who are
interested in putting themselves on the web.eg text, pictures, sound, video,
• Website: Collection of web pages belonging to an organization or individual
• Web browser: Program that lets the user surf on the web. Some of the
common types of web browsers are Internet Explorer, Firefox, Chrome,
Microsoft Edge, Torch, etc.
• Web hosting: A WWW server is a computer with programs that answers
requests for documents from clients [browsers] over the internet.
• Web address: (Uniform Resource Locator URL) An address is a location of a
file. Each web page in the world has a unique internet address or location. The
internet addresses are called URLs. e.g. URL of Microsoft is
http://www.microsoft.com

You might also like