Malicious damage - when a person intentionally sets out to corrupt or delete electronic files, data or software programs e.g. White Collar Crime. Further examples could include:-
A hacker intentionally deleting or altering another customer’s data or planting a virus that deletes someone's data
A company employee intentionally deleting or altering a customer’s data e.g. Disgruntled bank employees could damage data to hurt bank
A customer deleting or altering another customer’s information or about themselves
Customers of an online shop are able to login to view past orders and amend their stored payment details. Without suitable preventive measures, this data could be subject to damage.
Damages and Preventative Measures
Malicious Damage
Malicious damage may occur by hackers (or similar) deleting or amending payment details on purpose. This could be prevented by ensuring the data is protected by passwords/firewall.
Another circumstance where malicious damage might occur is a disgruntled store employees deleting or amending payment details on purpose this could be prevented by only allowing certain employees write access rights to the data
A company employee could intentionally delete or alter another customer's data. This could be prevented by restricting access rights for company employees. They could have usernames, passwords and security questions to enter the system.
A customer could delete or alter another customer's information. This could be prevented by having restricted access rights for customers e.g. they can only access their own data.
A virus deliberately set to intentionally delete or alter customers data. Up-to-date anti virus software could help prevent this.
Preventative Measures for Malicious Damage
Firewall
Username and password (security questions) to enter system
Restricted access rights for company employees i.e. must not be allowed to amend or delete customer files
Restricted access rights for customers i.e. customers can only access their data
Virus checker
Accidental Damage
A customer deleting or altering customer’s data unintentionally e.g. statements
A company employee deleting or altering a customer’s data unintentionally e.g. bank employee deleting information by accident
Computer server crash / system failure
Computer damage due to fire / flood
Money lost / gained during electronic transfer
One circumstance where accidental damage might occur is customers or shop employees deleting or amending payment details by accident. This could be prevented by making data e.g. account files and statements read only/confirmation dialogue box e.g. to ask the user for confirmation of amendments or deletions.
Accidental damage could also be prevented by ensuring staff have had suitable training and making sure there are clear user instructions.
Prevent accidental damage
• Make account files and statements read only
• Ask user for confirmation of amendments or deletions
• Suitable staff training and clear user instructions
There are many methods used in file security to prevent accidental data loss from computer systems.
• A data backup is a copy or archive of files and folders for the purpose of being able to restore them in case of data loss.
• Autosaving of files as you use them e.g. Word keeping backup copies.
• This involves storage of three of the most recent versions of master file. (grandfather – father - son)
• Useful if one version is corrupted: the previous version(s) is still available
• Data should be stored off site in case of a disaster.
• This method is an incremental file security method, meaning that in order to restore a database to a certain point-in-time, all transaction log records are required to replay database changes up to that particular point-in-time
• Only backs up data that has changed and writes over older back ups
• Useful as it saves storage space and is faster than full backup.
• Version control
• Users can be given rights to certain files or file structures that prevent them from accessing them / changing them / deleting them.
• File attributes
Many large organisations back up the data stored on its network on a daily basis. There are many suitable back up procedures that the organisation could use and a range of secondary storage devices that could be made available on which the data can be stored.
Click on the links below to refresh your knowledge on:-