Welcome to A-level ICT
There are a number of ways data can be kept safe from deliberate crime or misuse. Three main crimes are hacking, spreading a virus and white collar crimes.
CRB/DBS Checks
Background Checks
The Criminal Records Bureau (CRB) and the Independent Safeguarding Authority (ISA) have merged to become the Disclosure and Barring Service (DBS). CRB checks are now called DBS checks.
Anti-Virus Software
Locks on computers
Methods for controlling access to computer rooms e.g. smart cards to control entrance to rooms; physically locking the doors, window grilles, CCTV.
Secured areas to hold servers
not leaving the computer logged on when the user is away from it
Methods for physical protection of hardware and software
Security of document filing systems
such as voice or hand prints; retina scans;
(Logon procedures) use of suitable username and hierarchy of passwords. All authorised users should be given user names and passwords. This will limit unauthorised access to the network.
(Audit trails) for tracing of access and detection of irregularities.
Identification User Name
Authentification Password
Authorisation – What files you can see and what your allowed to do
Methods including private and public keys
Methods for controlling access to computer rooms e.g. smart cards to control entrance to rooms; physically locking the doors, window grilles, CCTV.
Secured areas to hold servers
not leaving the computer logged on when the user is away from it
Methods for physical protection of hardware and software
Security of document filing systems e.g. Passwords and User IDs
such as voice or hand prints; retina scans;
To prevent hacking and also used to prevent spyware / viruses
A special environment set up to trap a hacker logging in over remote connections.
It authenticates messages coming into the network and verifies the legitimacy of the user to enter the network.
This device tries to stop intruders from identifying the IP (Internet Protocol) address of a user workstation accessing the Internet.
A proxy server can act as an intermediary between the user’s computer and the Internet to prevent from attack and unexpected access.
It allows client computers to make indirect network connections to other network services and hide our IP address.
As soon as getting such request, the proxy server will seek for the resources from the cache in its local hard disk.
To implement internet access control like authentication for Internet connection, bandwidth control, online time control, Internet web filter and control filter etc.
To scan outbound content, e.g. for data leak protection.
e.g. for remote access. Some companies operate a dial-back system.
A user logs on to a computer which immediately disconnects the line and dials the user back.
This would stop a user logging on with someone else's password.
Encryption methods including symmetric and asymmetric methodologies.
Data transmitted over a network is coded before transmission.
This means that anybody intercepting the transmitted data would not be able to understand it.
The data needs to be de-coded by the proper recipient.
These are programs introduced into computer systems which destroy or alter files by rewriting over data or by copying themselves over and over again until computer system is full and cannot continue.
Prevention
Don't' download unknown programs from the Internet straight to hard disc. Only use reputable sources.
Write protect media so can't be written onto
Don't copy illegal software
Use a virus scanning software and virus eradicationprogram. Make sure this is kept up to date with the latest virus definitions – available from the Internet.
Use diskless workstations on networks
Control access to portable media and do not let users use own disk etc on the organisations system.
Methods for physical protection of hardware and software Antivirus software, locks on computers etc
CRIMES
Bogus data entry when entering data
Bogus output – output may be destroyed to prevent discovery of fraudulent data entry or processing
Alteration of files e.g. employee alters salary rate or hours worked
Prevention or 'White Collar' computer crimes
Monitor all programs and users actions should be monitored and logged. All users should be identifiable and all files capable of being audited keep online transaction logs
Auditing procedures to detect fraud and tracing of access and detection of irregularities.