Data security, privacy and integrity
System security
- explain the difference between the terms security, privacy and integrity of data
- show appreciation of the need for both the security of data and the security of the computer
system - describe security measures designed to protect computer systems, ranging from the stand-alone PC to a network of computers, including:
- user accounts
- firewalls
- general authentication techniques, including the use of passwords and digital signatures
Objectives
System Security
- Ensures the system functionality
- Ensures only authorized user to have access to the system
- Types of threats to a system:
- Internal mismanagement
- Natural disaster
- Unauthorized intrusion to the system
- Malicious software entering the system
Discussion
- List methods that can prevent from those types of security threats to a system
Authentication
- Authentication is a technique to prove that the identity is indeed who the person is claiming to be
- Techniques includes:
- Password
- Biometric
- Digital Signature / Certificate
Strong/Secure password
- Write down the rules for strong password:
Firewall
- Firewall (usually) sits between LAN and WAN, designed to prevent unauthorised access between them
- Firewall can be hardware or software
- Techniques by firewall:
- Packet filtering: Examine all the incoming and outgoing packet, and to allow or reject based on the predefined rules
- Application gateway: Security checking is applied to specific applications
Data Security
- describe security measures designed to protect the security of data, including:
- data backup
- a disk-mirroring strategy
- encryption
- access rights to data (authorisation)
- show awareness of what kind of errors can occur and what can be done about them
Objectives
Security of Data
- Safeguarding the data against accidental or malicious damage or loss
- Recover from data loss
- Backup
- Disk mirroring
- Restrict access of data
- Encryption
- Authorisation
Backup
- Full backup
- Usually done in off-peak hours for the system
- Incremental backup
- A full backup is needed first, then only backup those changes, sometimes called differential backup
- Problem to backup:
- The files stored should be "frozen" during the backup - no changes should be made until the backup complete, otherwise inconsistent state may be recorded
Disk-mirroring
- Data is simultaneously stored on two (or more) disk systems during the normal operation
- RAID-1 is one of the example (research)
- It's also possible the mirror disk is situated remotely
- No need to freeze the data when backup (since every write operation will be done on all disks
- Not a replacement of backup, but both strategy are used in real life
Encryption
- Data or file is converted to meaningless code with some encryption key / algorithm
- Only accessible with the decryption key
- E.g. you can use password to protect a zip folder, thus the password act as the encryption / decryption key
- Encryption not only protects data from illegal access, but also ensures data are not tampered / intercepted during data transmission
Authorisation
- Authorisation is about whether a user has the right to access a certain part of system / data
- Note about difference between authorisation and authentication
- (Research) learn about the file security in a Windows system
Data Integrity
- Ensuring the data is valid and up-to-date
- During input, transfer, storage and retrieve etc.
- Techniques Include:
- Validation
- Verification
- describe error detection and correction measures designed to protect the integrity of data, including:
- data validation
- data verification for data entry
- data verification during data transfer, including
- parity check
- checksum check
Objectives
Data Validation
- Automatic checks by computer for validity of the inputted data
- Validation types:
- Range check
- Format check
- Length check
- Presence check
- Unique check - Make sure the data is not repeated, e.g. No two students have same ID
- Lookup check - Make sure the data is within the possible allowed list (usually the list is defined in Db)
- Check Digit (next page)
Check Digit
- An extra character is added to the field, e.g. the last number in DSEJ ID or Macau ID
- To ensure the data entered / transmitted is correct
- The check digit will be calculated once the data is entered, and compare with the entered check digit
- Depending on algorithms, usually check digit can pickup following errors:
- single (or more) digit error
- digit swapped in order
- Check digit cannot locate / correct error
Activity
- Try to research how ISBN check digit works
- Try with ISBN in your textbook and check if it is valid.
- Try to make some mistake when inputting the textbook ISBN, and see what type of mistake it can pickup
Data Verification during transmission
- Data can be corrupted during transmission
- Verification Techniques:
- Parity Bit (Odd/Even)
- Checksum (NOT Check Digit!)
- Parity Block Check
- Study: https://www.computerscience.gcse.guru/theory/error-detection
Parity Block Check
Parity Bit | Checksum | Parity Block | |
---|---|---|---|
Add one bit to 7-bit data to make the number of 1s odd or even | Extra redundant data (checksum) calculated using all the transferred data | Parity check made on a group of bytes in sequence | |
One bit error | Yes | Yes | Yes |
Two bit error | No | Possible | Sometimes |
Remark | Any Even number of error bit cannot be detected | Accuracy depends on size of checksum and algorithm | Able to locate which bit is wrong and auto-correct |
[F5CS] Data Security, privacy and integrity
By Andy tsui
[F5CS] Data Security, privacy and integrity
- 257