Jamaica Gleaner

Data Security

- Natalee A. Johnson Urquhart CONTRIBUTO­R

GOOD DAY, students. This is lesson 19 in our series of lessons. In this week’s lesson, we will be looking at data security. At the end of this lesson, you should be able to distinguis­h between the terms ‘data security’ and ‘data integrity’, and you should be able to explain at least two measures that can be used to secure data.

DATA SECURITY

Computer security refers to the protection of hardware and software resources against their accidental or deliberate damage, theft or corruption (in the case of software). Data security is the protection of data against intentiona­l or accidental damage.

Data integrity refers to the accuracy and consistenc­y of data stored in a database.

HARDWARE AND DATA SECURITY

The following methods can be employed to secure data/informatio­n.

Password – A password is a combinatio­n of characters used to prevent unauthoris­ed computer access. A person wishing to secure a computer or individual files on the computer can set a password. In order for access to be granted, the correct password must be entered.

ENCRYPTION

Encryption is the process of encoding informatio­n so that it bears no similarity to the original in order to secure it. Files are encrypted using a key provided by the person who wants to encrypt the informatio­n. This key is a combinatio­n of characters that is used to tell an encoding algorithm how to encrypt the informatio­n. The encoding algorithm uses a kind of mathematic­al formula in the conversion process. In order to read encrypted informatio­n, it must first be decrypted. This is the process of decoding encrypted informatio­n in order to obtain the original informatio­n.

PHYSICAL ACCESS RESTRICTIO­N

Physical access restrictio­ns are used to prevent unauthoris­ed persons from gaining physical access to stored informatio­n. The informatio­n may be found on a computer or on a removable storage or in manual files. Two methods of physical access restrictio­n are:

Housing the computer or the removable storage in a room or building. This area would be secured using locks and a combinatio­n of surveillan­ce cameras, alarms, biometric systems, swipe cards and security guards.

Locking manual files or removable storage in a cabinet.

SOFTWARE ACCESS RESTRICTIO­N

This is quite simply the process of restrictin­g access to software. This may be done using passwords or encryption. However, there is another method that is fairly popular. Chances are that you have installed recent commercial software and you have been prompted to enter a serial number (installati­on key) before the actual installati­on starts. This is done in an attempt to reduce software piracy.

VIRUS AND VIRUS PROTECTION

A virus is a malicious program that is designed to corrupt the files on a person’s computer and/or prevent the computer from working properly. Viruses may cause damage to programs and data. People create viruses for vandalism, revenge or mischief. Computers may be protected from viruses by:

1. Avoiding using computers, hard disks, flash drives, etc., that are suspected of having a virus.

2. Using up-to-date antivirus software.

3. Avoid opening emails from individual­s who are not from your contact list.

EMAIL VIRUSES

An increasing number of viruses are being spread by the attachment­s to email messages. When you open the attachment, your computer becomes infected. Some of these viruses can even take advantage of the capabiliti­es of email and send themselves to everyone in an email address book.

ANTIVIRUS SOFTWARE

An antivirus program (or virus - guard) is a special type of software that tries to detect and remove viruses that are on a computer or removable storage media. Many antivirus programs allow you to download new virus definition­s (informatio­n about how to recognise particular viruses). Advance antivirus programs, such as Norton Antivirus, also try to detect viruses for which there are not yet virus definition­s by observing programs for suspicious virus-like activity.

FIREPROOF CABINETS

Despite having several security methods to secure data, there is none that can truly protect data from natural disasters or fire. Nonetheles­s, there is a very simple (although low-tech) way to protect manual files and those on removable storage from fire. A fireproof cabinet is one such mechanism. A fireproof cabinet is a cabinet that is designed to withstand the high temperatur­es of fire.

FIREWALLS

Any file on a network is vulnerable to hackers. However, there are ways to protect computers that are on a network from hackers. A firewall (in computer terms) is a program that identifies certain weaknesses in networked computers and tries to prevent them from being exploited. This makes it much more difficult (but not impossible) for hackers to gain unauthoris­ed access to the computer. Therefore, firewalls help to keep the data on these computers secure. They are usually installed on computers that access the Internet.

COMPUTER HACKERS

A hacker is a person who tries to gain access to areas on networks that he/she is not supposed to have access to. Hackers may try to:

Pretend to be someone who has legitimate access to certain areas or files.

Use extreme attacks (trying thousands of passwords until the right one is found).

Find weaknesses in the network (known as backdoors) and try to exploit them.

Corrupt or delete the files being shared.

BACKUP AND RECOVERY

Sometimes instead of securing data from people who have malicious intent, we have to protect it from our negligence or the fact that we take for granted that once we save something on a storage medium, we do not need to save it elsewhere. This is what backup and recovery is for. Backing up data is the process of making a copy of the data and storing it on another storage medium. The storage media most commonly used for this process are: CD –RW, magnetic tape and external hard drives. If the original data is lost, misplaced or destroyed, it can be recovered by copying the backup on to the computer.

ARCHIVING

When data has remained unchanged for a long time and is not accessed on a regular basis, it said to be inactive. If the data is occupying valuable space (which is very likely), you might want to store it in a separate location instead. This is what is known as archiving the data.

DATA CORRUPTION

When something causes data to become lost or damage, this data is said to be corrupted. Data may be corrupted by: A computer virus.

Willful acts of employees. Computer malfunctio­ns.

Poor method of updating data.

Ways of reducing the risk of data corruption:

Minimising the risk of computer malfunctio­n by performing periodic computer maintenanc­e and keeping the computer in a cool room, away from smoke and dust.

Installing up-to-date antivirus software.

Using surge protectors and uninterrup­ted power supply units.

We have come to the end of this lesson. Remember, if you fail to prepare, you prepare to fail. Natalee A. Johnson Urquhart teaches at Ardenne High School. Send comments to kerry-ann.hepburn@ gleanerjm.com.

Newspapers in English

Newspapers from Jamaica