Professional Documents
Culture Documents
UNIT F:
Data Security
Objectives
Risk management
Process of identifying potential threats to
computer equipment and data
Implementing plans to avoid as many threats as
possible
Developing steps to recover from unavoidable
disasters
Power failure
Complete loss of power to computer system
Even brief power interruption can force computer to
reboot and lose all data in RAM
Power spikes, voltage spikes, and power surges can
destroy circuitry or damage a motherboard
Cyberterrorism
Terrorist acts committed via Internet
Uses viruses and worms to destroy data and
corrupt systems
Power grids and telecommunications
Power protection
UPS (uninterruptible power supply)
Authentication protocol
Any method that confirms persons identity
when using computer system
Something person carries
Something person knows
Some unique physical characteristics
Biometrics
Two-factor authentication
Verifies identity using two independent
elements of confirmation
More secure than single-factor authentication
User ID
Also known as username, login, screen name,
online nickname, handle
Typically public and do not offer any level of
security
Password
Verifies user ID and guarantees that you are
the person you claim to be
PIN
Like passwords, PINs are something user
knows
PIN - short sequence of numbers, can be
entered using numeric keypad
Password tends to be longer sequence letters,
numbers, and special characters
Password manager
Utility software that generates secure
passwords and stores them along with user
IDs
Allows for use of unique and secure passwords
for every one of your online accounts
User rights
Rules that limit directories and files each user
can access
Computer virus
Set of program instructions
Attaches itself to file, reproduces itself, and spreads
to other files on same computer
Does NOT spread by itself from one computer
to another
Spreads when infected files are distributed
Zombie
Computer under control of bot
Botmaster
Person who controls many bot-infested computers
and can link them together into network called
botnet
Computer Concepts Illustrated Introductory, Seventh Edition,
Enhanced
Exploring Security Threats
and Malware
Spyware
Program that secretly gathers personal
information without victims knowledge
Usually for advertising and commercial
purposes
Can piggyback on seemingly legitimate
freeware or shareware downloads
Can also allow spyware into computer by:
Clicking infected pop-up ads
Surfing through seemingly valid and secure but
compromised Web sites
Cookie
Message containing information about user
sent from Web server to browser
Stored on users hard drive
Marketers, hackers, and pranksters have found
harmful uses for cookies
Ad-serving cookie
Allows third party to track activities at any site
containing their banner ads
Privacy issues have developed
Antispyware
Security software designed to identify and
neutralize Web bugs, ad-serving cookies, and
spyware
Spam
Unwanted electronic junk mail that
arrives in online mailbox
Blocking spam
Email authentication techniques
Sender ID, Domain Keys
Spam filter
Utility that captures unsolicited email before
it reaches inbox
Backup software
Utility programs designed to back up and restore
files
Restore point
Contains computer settings
If problems occur, might be able to roll back to
restore point
Boot disk
Removable storage medium containing OS files
needed to boot computer without accessing hard
drive