Page 254 - DCAP104_EXPOSURE_TO_COMPUTER_DISCPLINES
P. 254

Unit 13: Understanding the Need of Security Measures



              •  Data can be damaged due to many reasons. You must protect your data from illegal access   Notes
                 or from damage.
              • Cyber terrorism can be defined in different ways viz. it can be politically motivated hacking
                 operations inteded to cause grave harm such as loss of life or severe economic damage.

            13.7  Keywords

            Authentication: The process of verifying that users are who they claim to be when logging onto a
            system. Generally, the use of user names and passwords accomplishes this. More sophisticated is
            the use of smart cards and retina scanning. The process of authentication does not grant the user
            access rights to resources-this is achieved through the authorization process.

            Availability: The prevention of unauthorized withholding of information or resources. This does
            not apply just to personnel withholding information. Information should be as freely available
            as possible to authorized users.

            Brownout: Lower voltages at electrical outlets. Usually they are caused by an extraordinary drain
            on the power system.

            Computer security: Computer security means to protect information. It deals with the prevention
            and detection of unauthorized actions by users of a computer.

            Confidentiality: The prevention of unauthorized disclosure of information. This can be the result of
            poor security measures or information leaks by personnel. An example of poor security measures
            would be to allow anonymous access to sensitive information.

            Cyber terrorism: It can be defined as any computer crime targeting computer networks without
            necessarily affecting real world infrastructure, property, or lives.

            Data protection: It means making sure that private data belonging to a person or organization
            is kept hidden from those who are not authorized to use it.

            Detection: Take measures that allow you to detect when information has been damaged, altered,
            or stolen, how it has been damaged, altered, or stolen, and who has caused the damage. Various
            tools are available to help detect intrusions, damage or alterations, and viruses.

            Finger faults: These are an all too frequent cause of data corruption. This commonly happens
            when you are intending to delete or replace one file but actually get another.

            Hacking: It is the activity of breaking into a computer system in order to gain an unauthorized
            access to it. The unauthorized revelation of passwords, the hacking of IP addresses can prove
            being severe threats to the well-being of society.

            Integrity: The prevention of erroneous modification of information. Authorized users are probably
            the biggest cause of errors and omissions and the alteration of data. Storing incorrect data within
            the system can be as bad as losing data. Malicious attackers also can modify, delete, or corrupt
            information that is vital to the correct operation of business functions.
            Prevention: Take measures that prevent your information from being damaged, altered, or
            stolen. Preventive measures can range from locking the server room door to setting up high-level
            security policies.

            Reaction: Take measures that allow recovery of information, even if information is lost or damaged.





                                             LOVELY PROFESSIONAL UNIVERSITY                                   247
   249   250   251   252   253   254   255   256   257   258   259