13.2network Security Notes - 2
13.2network Security Notes - 2
1 of 11
Key terms
Malware: malicious software
Spyware: malicious software
that records what a user is
doing on a computer system
2 of 11
Malware
3 of 11
Computer viruses
4 of 11
Different types of viruses
Macro virus: It will attach themselves to macros that are part of the macro
enabled document.
Email viruses: It arrive as attachment to email and are triggered by the user
opening the attachment.
5 of 11
Computer worms
Computer worms
Computer worms are self-replicating programs which are
specifically designed to target networks. It uses the network
to send copies of itself to other devices on the network, and as
it is not a virus, it does not need to attach itself to a program.
Worms and viruses can
cause millions of pounds
worth of damage, mainly due to
the time and labour it takes to
remove them but also because
files on infected computers may
be lost or damaged.
6 of 11
Trojan horses
7 of 11
Hacking
8 of 11
Spyware
Key logger
If a key logger is used, then every keystroke made
by a user is recorded and this could include
confidential data
9 of 11
Denial service attack:
DoS attacks are not designed to gain access to data, but purely to
cause disruption. Distributed denial of service attacks use multiple
connections
10 of 11
Malware system[anti-virus and anti-spyware]
11 of 11
Ignoring it is very dangerous because It means
the malware will be excited and may have
unexpected results.
disinfecting the malware is the safest option
as it completely removes the malware from the
system, but it does mean that data or program
that included the malware will be deleted. The
compromise is to put the malware into
quarantine. This is a safe area where the
malware cannot be executed, but the data or
program remains isolated until it can be
checked thoroughly.
12 of 11
Physical security
13 of 11
Main servers should also be protected against
electrical surges. This can be done using
extension leads that offer surge protection, but
most servers will be protected by un interrupting
power supply [UPS] units which are basically
battery packs that will provide power in the
event of a power cut, but will also ensure that
the power supply is uniform
15 of 11
The need for a data protection act
16 of 11
data subjects expect that enough information will be stored about
them by data users in order to carry out necessary data
processing. For example, if salary payments are being made to
employees, then the employees would expect their employer to keep
records of any tax that has been deducted and any tax allowances
that should be applied. Data subjects also expect that only
necessary and relevant data will be stored about them, as they
have a right to privacy. Fro example: person applying for a
travel pass for public transport would not expect the transport
authority to be strong , information about their mental health
Data subjects have the right to expect that their data will be
accurate and up to date. It is the data users responsibility to
ensure that data is entered accurately in the first place, but
the data subject must also have a right to request that any
inaccurate data is corrected. The data subject must also take
responsibility for informing data users of any changes to
personal information, such as change of address, of which data
users should be made aware. Data users can make use validation
and verification techniques to reduce errors during data entry.
17 of 11
Data users should only store data for as long
as it is necessary. This means that they
should remove data when it is not needed any
more. Data subjects have a right to expect
that their data will be kept secure. It is
therefore the responsibility of data users to
put security measures in place, as described
earlier in the chapter. If data is lost,
damaged or accessed unlawfully, then the data
user could be prosecuted for not providing
adequate security.
18 of 11
19 of 11
20 of 11