Ict Security
Ict Security
SECURITY
IT 101 - BSMA
OBJECTIVES
HUMAN ERRORS
• Humans often are not good at assessing their own information needs
• Human emotions affect performance
• Humans act on their perceptions, which may not be fast enough to keep up
PROCEDURAL ERRORS
Some spectacular computer failures have occurred because someone didn’t follow procedures. In
1999, the $125 million Mars Climate Orbiter was fed data expressed in pounds, the English unit of
force, panel 9.2 Threats to computers and communications systems The Challenges of the Digital Age
463 instead of newtons, the metric unit (about 22% of a pound). As a result, the spacecraft flew too
close to the surface of Mars and broke apart. A few years earlier, Nasdaq, the nation’s second-largest
stock market, was shut down for 2½ hours by an effort, ironically, to make the computer system more
user friendly. Technicians were phasing in new software, adding technical improvements a day at a
time. A few days into this process, technicians trying to add more features to the software flooded the
data storage capability of the computer system. The result was to delay the opening of the stock
market and shorten the trading day. In 2001, a failed software upgrade halted trading on the New York
Stock Exchange for an hour and a half.
SOFTWARE ERRORS
We are forever hearing about “software glitches” or “software bugs.” A software bug is an
error in a program that causes it not to work properly. For example, in 2008 experts found a
software glitch that would have allowed attackers to gain control of water treatment plants,
natural gas pipelines, and other utilities. Also in 2008, patients at Veterans Administration
health centers were given incorrect drug doses, were delayed in treatments, and experienced
other medical errors because of software glitches in health records.
“DIRTY DATA” PROBLEMS
When keyboarding a research paper, you undoubtedly make a few typing errors (which,
hopefully, you clean up). So do all the data-entry people around the world who feed a
continual stream of raw data into computer systems. A lot of problems are caused by this
kind of “dirty data.” Dirty data is incomplete, outdated, or otherwise inaccurate data. A
good reason for having a look at your records—credit, medical, school—is so that you can
make any corrections to them before they cause you complications. Although databases are
a timesaving resource for information seekers, they can also act as catalysts, speeding up
and magnifying bad data.
ELECTROMECHANICAL PROBLEMS: ARE “NORMAL
ACCIDENTS” INEVITABLE?
• Electrical problems: Power failures (brownouts and blackouts) can shut a system down. Power
surges can also burn out equipment. One major area of concern is that as information technology
spreads, lightning strikes that once simply made the houselights flicker will now burn out
computers, phones, web connections, and servers. Since some areas experience more electrical
hits than other areas do, lightning frequency could significantly affect regional economies.
• Voting machine breakdowns: As examples of how badly information technology can work, we
have only to consider failures in voting machines, when printers jammed, servers crashed, and
poorly designed touch-screen ballots led voters to make mistakes that invalidated their votes.
2. NATURAL HAZARDS
ORGANIZED CRIME
Members of organized crime rings not only steal hard ware, software, and data; they also use spam,
phishing, and the like to commit identity theft and online fraud. Even street gangs now have their
own web sites, most of them perfectly legal, but some of them possibly used as chat rooms for drug
distribution. In addition, gangs use computers the way legal businesses do—as business tools—but
they use them for illegal purposes, such as keeping track of gambling debts and stolen goods.
CYBERWAR FIGHTERS
Cyberwarfare, or cyberwar, is the use of computers and the internet to attack an enemy’s information
systems.
SECURITY: SAFEGUARDING COMPUTERS &
COMMUNICATIONS
Credit cards, debit cards, and cash-machine cards all have magnetic strips or built-in
computer chips that identify you to the machine. Many require that you display your
signature, which may be compared with any future signature you write. Computer rooms
are always kept locked, requiring a key. Many people also keep a lock on their personal
computers. A computer room may also be guarded by security officers, who may need to
see an authorized signature or a badge with your photograph before letting you in. Of
course, credit cards, keys, and badges can be lost or stolen. Signatures can be forged.
Badges can be counterfeited.
WHAT YOU KNOW—PINS & PASSWORDS
To gain access to your bank account through an automated teller machine (ATM), you key
in your PIN. A PIN (personal identification number) is the security number known only to
you that is required to access the system. Telephone credit cards also use a PIN. If you carry
either an ATM or a phone card, never carry the PIN written down elsewhere in your wallet
(even disguised). As we stated earlier in the book, passwords are special words, codes, or
symbols required to access a computer system. Passwords are one of the weakest security
links, and most can be easily guessed or stolen.
WHO YOU ARE—PHYSICAL TRAITS
Encryption is the process of altering readable data into unreadable form to prevent
unauthorized access, and it is what has given people confidence to do online shopping and
banking. Encryption is clearly useful for some organizations, especially those concerned
with trade secrets, military matters, and other sensitive data.
PROTECTION OF SOFTWARE & DATA
CONTROL OF ACCESS
Access to online files is restricted to those who have a legitimate right to access—because
they need them to do their jobs.
AUDIT CONTROLS
Many networks have audit controls for tracking which programs and servers were used,
which files opened, and so on. This creates an audit trail, a record of how a transaction was
handled from input through processing and output.
PROTECTION OF SOFTWARE & DATA
PEOPLE CONTROLS
Because people are the greatest threat to a computer system, security precautions begin with
the screening of job applicants. Résumés are checked to see if people did what they said
they did. Another control is to separate employee functions, so that people are not allowed
to wander freely into areas not essential to their jobs. Manual and automated controls—
input controls, processing controls, and output controls—are used to check if data is
handled accurately and completely during the processing cycle. Printouts, printer ribbons,
and other waste that may reveal passwords and trade secrets to outsiders are disposed of
through shredders or locked trash barrels.
4. DISASTER-RECOVERY PLANS
Surveillance, implies an agent who accesses (whether through discovery tools, rules or
physical/logistical settings) personal data. Privacy, in contrast, involves a subject who
restricts access to personal data through the same means.
Privacy is the right of people not to reveal information about themselves. Many people are
worried about the loss of their right to privacy—more than 90% of respondents to one
survey called online privacy a “really” or “somewhat” important issue—fearing they will
lose all control of the personal information being collected and tracked by computers.
BUSINESS & CYBERSPYING