Please enable JavaScript.
Coggle requires JavaScript to display documents.
2.8 Data Security and Integrity Processes (Malicious Software (Virus -…
2.8 Data Security and Integrity Processes
Risks
External - Hackers who try to force their way into a system, whether that be through brute force on the whole system, or planting a Trojan into an employees computer.
Internal - Includes unauthorised people entering a building and hacking into a system, or employees using their privileges to leak information.
Unintentional - Things like file corruptions or accidental deletion of files can occur.
Protecting
Auto-locking workstations when not in use.
Passwords need to be changed regularly and have specific requirements so they can't be guessed easily.
Access levels, so employees that do want to leak information, can only access certain bits.
Filtering systems that mean employees are limited to what they can view and download on the internet.
Cryptography
Turns plain text into cipher text, using a key of some description.
Caesar Shift - Shifts the alphabet by a few characters so that its unreadable, until the same number of shifts is reversed. easily breakable, by brute force or other algorithms.
Symmetric Encryption - Where the same keys are used to encrypt and decrypt the message, eg. XOR.
Asymmetric Encryption - Where a public key is used to encrypt the message and a private key is used to de-crypt it.
Biometric
Facial Recognition - Relatively inaccurate form of security
Finger Prints - Easy to make fake finger prints
Iris Scanning - Fairly secure, but complex
DNA - Can be easily by-passed, by collecting a sample off of the person.
Hacking
Black Hat - People who hack into a system for their own personal gain.
White Hat - Ethical hackers who are hired by the company to see if they can break into their system, to expose flaws.
Grey Hat - People who hack into a system to expose flaws, but are not employed to do so.
Penetration testing
Reconnaissance - Where the hacker gets as much public data as possible. Eg. Employee names, software, etc.
Scanning - The hacker will go into the system and look at the ports, software versions and basically get a view of the system.
Gaining Access - They might find a weakness in security somewhere, and use this to gain access to the system.
Maintaining Access - Here, the user might create a back door, a new user in the system or change a users password, so they can get back into the system easily.
Covering Tracks - Finally, the hacker will try to remove all trace of themselves from the system, by deleting certain logs and hiding their IP addresses.
Malicious Software
Virus - Will attempt to corrupt storage devices and cause the system to fail. Usually spread through emails or websites.
Trojan - A virus which activates when the user opens a file. Usually in the form of digital downloads.
Spyware - Will not give any indication to the user that its there, but will track key strokes and event logs, reporting the data back to the hacker.
Scare-ware - Will trick the user into downloading files by saying things like "Your system is corrupted" etc.
Bot-nets - Gives access to your computer from outside, creating a network of computers a hacker can use at will.
Contingency Planning
In case of natural disasters, server malfunctions or hacked systems, precautions need to be made so that the system can still operate, and data isn't lost.
Things like back-up servers, off-site data storage and relocating key personnel are priorities.