Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
3 views2 pages

Security

Computer Science IGCSE

Uploaded by

ets090909
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views2 pages

Security

Computer Science IGCSE

Uploaded by

ets090909
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Security, privacy and data integrity

Definitions of data integrity, privacy and security:


Data integrity – A requirement for data to be accurate and up to date
Data privacy – A requirement fir data to be available only to authorised users
Data security – A requirement for data to be available for use when needed, ensures that
inly authorised users have access to the system and data can be recovered if lost or
corrupted

Threats to the security of a computer system and


of the data stored in it:
Malware – Malicious software that has the intention of causing harm to a system or its
contents.
 Trojan horse – Replaces all or part of a previously useful program
 Spyware – Collects information and transmits it to another system
 Bot Takes control of another computer and uses it to launch attacks
 Phishing – Sending an email or electronic message from an apparently legitimate
source requesting confidential information.
 Pharming – Setting up a bogus website which appears to be a legitimate site.
 Keylogger – Recording keyboard usage by the legitimate user of the system.
System vulnerability arising from user activity – Many system vulnerabilities are associated
directly with the activities of legitimate user of a system:
 The use of weak passwords, this makes it easy for the hacker to guess the password.
 A user not recognising a phishing or pharming attack.
A legitimate user might introduce a malware deliberately or by accident. This is done by:
 Attaching a portable storage device
 Opening an email attachment
 Accessing a website
 Downloading a file from the Internet
Vulnerability arising from within the system itself – System themselves often have security
weakness. Here are some examples:
 Lack of good security
 Commonly used application packages allow micro viruses to spread
 Buffer overflow
Security measures for protecting computer
systems:
Disaster recovery – If there was to be a system shutdown at the very least the service
should be back up and running after a very short time if it is in a continuity of operation.
Safe system update – The company service should never be shut down so when they are
doing an update they have to have the original system and its replacement running in
parallel for a period to ensure continuity of service.
User authentication – For any account or PC there should always be a way to authenticate if
the user trying to login is the correct user.

You might also like