Data Confidentiality
Download
Report
Transcript Data Confidentiality
Data Confidentiality
Learning Objectives:
By the end of this topic you should be able to:
• discuss the need to keep data confidential
• explain how data confidentiality can be
achieved;
Learning Objective:
By the end of this topic you should be able to:
• discuss how the following can be used to protect data:
– encryption,
– authorisation,
– authentication,
– virus checking,
– virus protection,
– physical security
Learning Objective (G061 synoptic)
• explain methods for combating ICT crime and
protecting ICT systems:
–
–
–
–
–
–
–
physical security,
firewalls,
backup,
encryption,
biometric security,
software patches/updates,
‘anti-virus’ & antispyware software,
–
–
–
–
–
–
access rights,
auditing,
education of users,
user IDs,
passwords
methods for ensuring
passwords remain
effective
Confidentiality
•
•
•
•
is my data safe?
can I trust who has access to my data?
is my data correct?
can I be sure that my data will not be passed on?
Example:
• bank account information is highly confidential
– however, on-line banking takes place through the Internet
an open network
prone to attacks by hackers
Why does data need to be
kept confidential?
1. to comply with the Data Protection Act
–
–
personal data must be kept secure
personal data must not be revealed
2. organisational reasons
–
information maybe commercially sensitive
details of new products or procedures
• of value to competitors
Encryption
What is Encryption?
• the process of disguising messages or data
– ‘scrambling’ data
– so that only the intended recipient can understand them
– if data accessed unlawfully, it will be meaningless to
unauthorised user
• involves data being ‘arithmetically transformed'
before transmission in a scrambled form.
– uses a random process set up using a special key value
– the data is then decoded at receiver
by reversing the encryption process.
Encryption
Why use Encryption?
• to provide security of data
– especially during transmission through the Internet
– where it is liable to interception.
• so that sensitive data cannot be understood by criminals
– credit card details, emails
• to ensure that data of a sensitive nature can only be
accessed by those for whom data is intended
– to maintain privacy
• to protect important data that might be hacked or stolen
– music CD, movie DVD, digital TV
Authorisation
• giving permission (authority) for users to access data
• different users are allowed to access different data
– and/or perform different operations on data
Authorisation: Levels of Access
1. may want to restrict access to data
– only certain users can access the data
– so that unauthorised changes are not made
2. data is commercially valuable
– could be stolen or damaged/modified
3. legal restrictions on the access to personal data
– DPA
Authorisation: Levels of Access
• there are four main levels of access rights to data:
–
–
–
–
Read Only: a user is allowed to view data
Create: a user is allowed to create new data records
Write: a user is allowed to make changes to data
Delete: a user is allowed to delete data
• to gain authorisation, a user must identify themself
• usually by entering a user name (User ID)
• other methods of supplying User IDs include:
– such as a magnetic stripe on the back of a card,
– a smart chip on a card,
– biometric: voice recognition, finger print, retina scan ….
Authorisation: User IDs
Why?
• allow access to user areas
– stop unauthorised access
– protect data
• to make individual users members of groups
– allow access to files based on access rights
– allow access to resources – printers, software
• to be able to monitor use
– audit logs
• to comply with the law
– DPA
Authorisation: User IDs
Effectiveness of user ID maintained by:
• must be unique
– so can be sure who is doing what
• can be suspended when user is away
– on holiday, leaves the company (or infringes code of conduct)
• can be linked to resources
– an individual machine
– software applications
– times of use
Authentication
• “the process of determining the identity and
legitimacy of a user or process”
– confirming that a user is who they say they are
Why:
• authorisation only tells the computer who the user is
• authorisation does not prevent somebody from
pretending to be a different person
• need a 2nd level of identification
Authentication
3 main ways for authenticating individuals:
• 'Something you know'
– password, PIN
• 'Something you have'
– mobile phone, credit card or hardware security token
• 'Something you are'
– biometric: voice recognition, fingerprint, retinal scan ….
Authentication: Password
Effectiveness of password maintained by:
1. Network Manager:
–
–
–
–
–
–
force password change frequently
enforce minimum length password
enforce unrecognisable words only (not in dictionary)
must contain numbers and letters (& punctuations)
cannot reuse passwords
3 incorrect password attempts account is locked
2. User:
–
–
–
not writing password down
make it something others can’t guess – not personal
make sure no one is looking when you type it in
Viruses
• a program which infects computer systems by selfreplicating (copying itself to other systems)
• computers can be infected by viruses when new data is
introduced to the computer:
– removable media: USB storage devices, memory cards, CD-R,
DVD-R
– across a network: LAN, via the Internet
• infection by a virus can:
– cause harm to data on a computer
– collect information about a user without the user’s knowledge
(spyware)
Boot Sector Viruses
• spreads by hiding itself in the boot sector your hard
drive or floppy disk.
• when your computer reads an infected floppy disk, the
virus is copied from the disk to your computer's
memory.
• any new disk, CD or memory stick inserted in the
computer will then become infected
• if this storage medium is used on another computer – it
becomes infected ……
E-mail Virus
• contained in attachments to e-mail messages,
• replicates itself by automatically mailing itself to
people in the victim's e-mail address book.
• spreads very rapidly
Trojan
• a computer program
• program claims to do one thing but instead does
damage when you run it
– delete files, erase hard disk
• opens your computer up to malicious intruders,
allowing them to read your files
• appears to be friendly – but isn’t!
Macro Virus
• many applications now have their own built-in
programming language (macro language)
– Microsoft Office applications use Visual Basic
• infects word processor files, spreadsheets, databases …
• can spread quickly
– if a Word file is sent via email
– file used by many people.
• Microsoft added protection into later versions of Word,
– now receive a warning about infected documents.
Virus Protection
• install anti-virus software on all computers
• scan storage devices for infected files
– detects viruses
– allows removal of infected code from file
– deletion of infected files
• regularly update virus data files
• install firewall on network
– hardware or software
• prevent use of removable storage media
– CDs, DVDs
– USB devices - memory stick, removable HDD
Audit Logs
•
•
•
•
consist of data about each stage of any transaction,
logs are maintained automatically by the system
allow the network manager to examine patterns of use
audit logs track:
– who did what,
– at which workstation,
– when it occurred.
• logs can be used to see which member of staff:
– accessed particular files
– other resources
– web pages.
Firewall
• network security device
– stands between a network and the outside world
– can either be hardware and/or software based.
– examines data packets moving into and out of the system.
• configured to permit or deny connections
– using a set of rules
– access is denied if not allowed by the rules
– rules set using the organization's security policy
configured by the system administrator
– checks data sent by users and applications
– filters websites users are permitted to visit
Why use a Firewall?
• prevents external users from gaining unauthorised
access to a computer system
• limits/filters the data that can be received or sent to
external users
• could block certain types of data
• to protect data from being viewed/altered/deleted
• to comply with the Data Protection Act
• to stop hackers/viruses from entering the system
January 2007
Physical Security
•
•
•
•
lock the computer up
entry measure to get into building
disconnect (or remove) floppy/CD/DVD drives
disconnect USB ports (memory sticks/portable HDD)