Posts

Module 1. Introduction to Data Security

Image
    Introduction to Data Security DATA VS INFORMATION Information is processed data that carries meaning and value The difference is subjective , what is data for one person may be information for another SECURITY ELEMENTS Confidentiality Authenticity Integrity Availability Nonrepudiation POTENTIAL LOSS Final loss Unavailability of Resources Identity theft and fraud Loss of trust Data loss/theft Misuse of Computer Resources IMPLEMENTING SECURITY Precaution Precautionary measures protect systems from threats and minimize damage . Key steps include installing and maintaining antivirus and firewall programs, using strong passwords, downloading files only from trusted sources, performing regular virus scans, and keeping the system updated. Maintenance System maintenance supports precautionary measures by ensuring security and efficiency . It involves creating data backups, updating antivirus and firewall programs, maintaining sufficient storage, preventing CPU overheating, and c...

Module 2. Securing Operating System

Image
    Securing Operating System WORKS OF OS Works with the processor to manage tasks Handles input from devices like keyboards Manages files, directories, and data storage Controls peripheral devices (printers, scanners, etc.) Displays output on the screen Allocates system resources (memory, CPU time) Ensures device and data security SECURING WINDOWS Lock Out Unwanted Guests Rename the Administrator Account Enable software & Windows update Enable Windows Firewall and Add the apps into it Raise the UAC Slider Bar Lock the System When Not in Use Prevent the Automatic Login Create a User Account Password in Windows Disable the Guest Account Turn on Windows Security Enable BitLocker Use EFS (Encrypting File System) Disable Unnecessary Services & unwanted processes Hide files and folders Disable Simple File Sharing SECURING MAC OS Lock the System When Not in Use Prevent the Automatic Login Enable Auto Software Update Disable the Guest Account Enable FileVault & Firewall...

Module 3. Malware and Antivirus

Image
    Malware and Antivirus DEFINITION Malware, short for malicious software , is created to damage, control, or steal information from computers. It includes various types of harmful software that can infect a system through web page components, pop-up ads, toolbars, or downloaded applications. Once inside, malware can steal sensitive information like passwords and bank details. Examples include Backoff, Dyreza, and BlackEnergy. Like a shell game where the pea is hidden, malware uses deception and stealth to infect systems, persist undetected, and communicate with external sources. Understanding and countering malware requires focusing on both the malware itself and the methods used to deploy it. TYPES Virus: A computer virus spreads like a biological virus by attaching to programs and files, relying on human actions to replicate and potentially harm systems by stealing data or creating botnets. Trojan : A Trojan disguises itself as legitimate software to deceive users, allo...

Module 4. Internet Security

Image
    INTERNET SECURITY DEFINITION Internet security is essential for both home and office users, protecting against fraud, theft , and property damage . It encompasses browser, network, and online data security, relying on encryption tools like PGP, firewalls, and antivirus programs . IMPORTANCES Privacy and confidentiality : Without protection, personal data can be intercepted and misused, leading to identity theft or scams. Identity theft : Hackers can exploit weak security to access financial or personal information, enabling fraud, unauthorized transactions, and loan applications. Data theft : Sensitive information such as photos, documents, and emails can be stolen, resold, or used for blackmail, damaging reputations and relationships. INSTANT MESSAGING Instant Messaging (IM) is a real-time communication method that allows users to exchange text messages, share files, and conduct video or voice chats through applications like Skype, WhatsApp, and Signal. IM provides featu...

Module 5. Security on Social Networking Sites

Image
    Security on Social Networking Sites DEFINITION Social networking sites help users connect , share content , and communicate online. Platforms like LinkedIn focus on professionals, while Facebook and Bebo serve general communities. These sites enable networking, job searching , and information sharing but also pose risks like identity theft and privacy concerns. While they can strengthen relationships, some argue they lead to social isolation. RISKS Social networking sites pose several security risks , including: Phishing – Attackers trick users into revealing personal information through fake websites and emails. Identity Theft – Hackers gather and misuse personal details for fraud, financial theft, or blackmail. Malware – attacks carried out through social engineering mislead users into clicking malicious links embedded within personal messages Site Flaws – Vulnerabilities in websites allow attackers to bypass privacy settings and steal data. URL Spoofing – Fake ...

Module 6. Securing Email Communication

Image
    SECURING EMAIL COMMUNICATION EMAIL Used to communicate electronically by sending messages from one computer to another via the Internet SPAMS AND FILTERING Spam refers to unsolicited commercial emails ; filtering helps discard or redirect unwanted messages USER CONSIDERATIONS Users choose email clients based on these considerations: security, privacy, visual appeal reliability, availability, and ease of use DIGITAL SIGNATURE AND ENCRYPTION Digital signatures verify  authenticity , while encryption  secures  messages from unauthorized access SECURITY THREATS Several threats in Email Communication are: malicious email attachments, malicious user redirection, phishing, hoax mail, and spam SYMMETRIC & ASYMMETRIC ENCRYPTION Symmetric encryption uses a single key, while asymmetric encryption uses a public-private key pair PHISHING AND HOAX EMAIL Phishing tricks users into revealing sensitive data , while hoax emails are forged to compromise security HASH FU...