2.8 Data security and integrity processes

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/70

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 6:20 PM on 5/4/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

71 Terms

1
New cards

What is the CIA triad?

Confidentiality, Integrity, and Availability of data which describe the key main aspects of security and integrity of data.

2
New cards

Data Confidentiality

Ensures that data is only accessible to authorised individuals (Protected by encryption, access controls, and authentication)

3
New cards

Data Integrity

Ensures data remains accurate, complete, and consistent. (Protected by validation, version control, hashing, and checksums)

4
New cards

Data availability

Ensures systems and data are accessible when needed. (Protected by backups, and disaster recovery management)

5
New cards

What are the CIA problems that can arise during the online updating of files?

  • Concurrent access (two users edit leading to data incosistency as one is overwritten) lead to data mismatch

  • Unauthroised acess

  • Partial updates due to system failure (power cuts lead to incomplete transactions)

  • Malware altering records (Viruses or ransomeware)

  • Data interception (man in the middle)

  • Deletion of files (accidental or deliberate)

  • Data corruption

6
New cards

What are some key file integrity issues?

  • Concurrent access

  • Lost and partial updates of files

  • Data corruption

7
New cards

What are key security riks for data

  • Unauthorised access, mainpulation, reading, or copying files

  • File corruption

  • Deletion of files

8
New cards

What is an external Risk to data?

Risks from users outiside of the company

  • Social engineering

  • Natural disasters

  • Phishing

  • DDos attacks

  • Malware

  • Man in the middle attacks

9
New cards

What are internal risks?

Risks from inside the company such as:

  • Employee error

  • Disgruntled employees

10
New cards

What are technical risks?

Risks to the systems techical aspect such as:

  • Hardware failure

  • Power outages

  • Software bugs

  • Network failure

  • Disk corruption

11
New cards

What is malicious damage?

Deliberate action intended to harm, steal, or disrupt data. Such as:

  • Malware altering data

  • Insiders deliberately deleting records (like a disgruntled employee)

  • DDoS attack

  • Data theft from phishing or spyware

12
New cards

What is accidental damage?

Unintentional actions that can result in data loss, corruption, or inaccessibility. such as:

  • Employee overwirting a file

  • Power failure

  • Software bugs

  • Misconfigured backups

13
New cards

What would be some causes of accidental damage?

  • Lack of staff training

  • Accidental deletion

  • Fatigue/stress (overworked staff)

  • Faulty hardware

  • Natural disasters (fires etc)

  • Overwriting data

14
New cards

What are some motives for hackiong into a system?

  • Criminal motives (Finacial gain, sabotage, revenge)

  • Personal motive (Vendetta against a company)

  • Political (Espionage (to gain sensitive intelligence))

15
New cards

Dangers that can arise from the use of computers to manage personal data files.

Data Breaches: Unauthorized access to personal data files can lead to significant data breaches, where sensitive information is exposed to malicious actors. This can result in identity theft, financial loss, and other forms of exploitation.

Malware and Ransomware: Computers managing personal data are susceptible to malware and ransomware attacks, which can corrupt, steal, or lock access to data until a ransom is paid.

Insider Threats: Employees or individuals with access to data files may misuse their privileges to steal or manipulate personal data for personal gain or malicious intent.

Breaches of personal data can lead to a loss of trust between individuals and organizations, damaging reputations and customer relationships.

Accidental deletion, hardware failures, or other technical issues can result in the permanent loss of personal data, affecting individuals' records and histories.

Errors in data entry, processing, or storage can lead to significant issues for individuals and organizations.

Personal data can be shared without the consent of the individuals involved, leading to violations of privacy and potentially damaging consequences.

16
New cards

What are some protections we can use to protect data agains mailcious or accidental damage?

  • Access rights

  • Recovery procedures

  • Required strong passwords

  • Antivirus

  • Clear instructions

  • Staff training on scams and malware

  • Confirmation for deleting files

  • Backups

  • Data entry validation

17
New cards

Contemporary processes that protect the security and integrity of data for Levels of Permitted Access

Role-Based Access Control (RBAC): Assigning permissions based on the user's role within the organization. Users are granted access only to the data necessary for their job functions.

Principle of Least Privilege (PoLP): Ensuring users have the minimum level of access needed to perform their duties, reduces the risk of accidental or intentional data misuse.

Access Control Lists (ACLs): Defining which users or system processes are granted access to objects, as well as what operations are allowed on given objects.

18
New cards

What are some standard clerical procedures to protect data

Things that an organisations employees should do to protect data such as:

  • Clean desk policy

  • Secure storage

  • Visitor control (control their access)

  • Staff training

  • Data minimisation (only collect necessary data)

  • Backups of data

  • Encryption of data

19
New cards

Contemporary processes that protect the security and integrity of data for passwords for access

Strong Password Policies: Requiring complex passwords that include a combination of letters, numbers, and special characters to increase security.

Two-Factor Authentication (2FA): Adding an additional layer of security by requiring users to provide two forms of identification before gaining access (e.g., password and a code sent to their phone).

Password Managers: Encouraging the use of password managers to generate and store strong, unique passwords for different systems.

Regular Password Changes: Implementing policies that require users to change their passwords regularly to mitigate the risk of compromised credentials.

Passwords stored as encrypted data in databases or locally on a machine to keep them safe

Passwords can ensure that no unathorised access can happen meaning access rights are much more effective

20
New cards

Contemporary processes that protect the security and integrity of data for write-protect mechanisms.

Read-Only Access: Setting certain files or databases to read-only mode ensures that data cannot be altered or deleted. (Doesnt stop reading though)

File Permissions: Configuring file systems to set permissions that restrict write access to authorized users only.

Immutable Storage: Using storage solutions that prevent data from being altered or deleted after it has been written, useful for log files or legal records.

Software will prevent data from being written to, modified, or erased protecting the data security

21
New cards

Cryptography

Cryptography, practically known as encryption, is simply the act of scrambling a piece of plain text into cipher text so that it can't be immediately understood.

It is used to safeguard information and communications through code so data is no interpreted by unauthroised parties

22
New cards

Why is cryptography important?

  • Transmission over public networks (data cannot be intercepted and read)

  • Data breaches (So it harder for confidential data to be exposed)

  • Compliance with legislation (Like GDPR)

  • Secure communication

Which is important in industries like banking and for messaging where you want data to be private

23
New cards

Caesar Cypher

Caesar Cypher (Shift Cyper) is the simplest and most well-known form of encryption, where each letter of the alphabet is shifted a certain number of places according to the key. (e.g. a key of 1 would shift a → b)

This can generally be cracked by analysing common letter frequencies (like A and E and use those to start as a basis for the shift)

24
New cards

What is a brute force attack

A method that involves systematically trying all possible comindations of encryption keys or passwords untill the correct one is found (software can greatly speed this up). It works by attempting to find the code and if the system returns a valid or invalid response then you know if it is correct or rong

25
New cards

What are ways that make brute foce attacks harder to perform

Strong passwords

2FA

Account lockout if too many incorrect passwords

26
New cards

What are the types of encryptions?

Symmetric (single key) Encryption
Asymmetric (Double key) Encryption

27
New cards

Symmetric (single key) Encryption

Symmetric encryption uses only one key that is used for both encrypting and decrypting the data.
The sender must send the message and the key to the receiver, although they will not be sent together.

The key must be sent securely as if it is incercepted during transmission then data can be decrypted

For example and XOR gate with a mask would be symmetric because you use the same on each time

28
New cards

Advantages and Disadvantages of Symmetric (single key) Encryption

- Symmetric algorithms have one key that has to be at both ends of a transmission.

- Symmetric is best used for data on your own disks, as it's fast
- Single key encryption can be faster to use.

- Single key encryption may not be secure if the key value has to be transferred over the internet and is intercepted by an unauthorised person.

- symmetric techniques are very easy for modern computers to crack.

- Single key encryption is suitable for personal use when encrypting files on a single computer. No transfer of the key value to another user is needed.

- Single key encryption is suitable for use within an office or work group, where the key value can be transferred during personal meetings or over a secure local area network.

29
New cards

Asymmetric (Double key) Encryption

Asymmetric encryption is also known as public key encryption. It uses two keys (public and private key), one to encrypt the data and one to decrypt the data. The keys are separate but mathematically connected. A public key can be shared and used to encrypt data and only the private key can decrypt it

This solves the key distribtuion issue for symmetric

30
New cards

What is the public and private key?

Public - Can be shared openly so that anyone can encrypt a message for the recipient

Private - The recipient of the message hold the private key and it is kept secret as it is the only thing that decrypts the messages

31
New cards

Advantages and Disadvantages of Asymmetric (Double key) Encryption

• Asymmetric algorithms have two keys - a private and a public key.

• With asymmetric algorithms, a shared secret key does not have to be exchanged over an insecure medium such as the Internet, as it does with symmetric algorithms

• If someone knows the encryption key, they can encrypt information but not decrypt it.

• Asymmetric is best used for keys, digital signatures, data sent over the web, e.g. bank details, etc.

• Double key encryption avoids the security risk by only revealing the public encryption key to the sender. The private decryption key is held securely by the receiver and is not revealed.

• Double key encryption is more suitable for the transfer of confidential data over the internet (such as credit card details), e.g., online hotel/airline bookings or shop purchases.

• In many cases, the public and private key pairs in an asymmetric system can remain intact for many years without compromising the security of the system. E.g., SSL certificates

• Asymmetric keys are far slower to use and not feasible for use in transmitting large amounts of data because of the increase in transmission times

• Asymmetric keys are harder to generate.

32
New cards

Whats and RSA cipher?

Asymmetric encrtion that uses prime numbers to encrypt data. It would use two prime numbers and follow the steps. for a public and private key. Then it will use powers and MOD to encrypt the message which can only be decrypted with the private key.

This data is gjven for exams

<p>Asymmetric encrtion that uses prime numbers to encrypt data. It would use two prime numbers and follow the steps. for a public and private key. Then it will use powers and MOD to encrypt the message which can only be decrypted with the private key.</p><p></p><p>This data is gjven for exams</p>
33
New cards

Symmetric vs Asymmetric encrytion?

knowt flashcard image
34
New cards

Biometric Security

Biometric devices are used to add security to a computer system.
A biometric device is something that works with unique features of the human body (behavioural and biological characterisitics) to recognise individuals

35
New cards

Types of Biometric Security

• Fingerprint recognition
• Iris Scanning
• Retina Scanning
• Facial recognition
• Voiceprint recognition

• DNA

36
New cards

Fingerprint Recognition

Fingerprint recognition is the process of capturing the person's fingerprints (for all or some of their fingers), then digitising and storing this data on a computer system. It isolates the fingerprint on the image and extracts certain features then uses this to create a template for comparison
When entry/access is attempted, the fingerprint is captured again.
The images are compared, with entry/access being allowed if there is a match.

However you may be able to replicate a fingerprint using a 3D model and use this to access a system (very specific and hard to do though)

37
New cards

Iris & Retina Scanning

Iris and retina scanning involve capturing the unique patterns of a person's iris or retina (such as blood vessels and patterns), digitising this data and creating a template, and storing it on a computer system, so that when entry/access is attempted, the iris or retina is scanned again, the new scan is digitised and compared to the stored data, and entry/access is allowed if there is a match.

It can be costly due to high resolution cameras required for this scanning

38
New cards

Facial Recognition and its uses

Face recognition involves capturing a person's facial features, digitising this data, and storing it on a computer system, so that when entry/access is attempted or surveillance is conducted, the facial image is captured again, the new image is digitised and compared to the stored data, and entry/access or identification is confirmed if there is a match.

It measured key facial features such as proportions and sizes of features like nose, eyes, and mouth

Face recognition could be used for instance, by the police at football grounds to check for known troublemakers by comparing current images with stored images.
There could be concern over the lack of privacy if innocent people's facial images are stored by the police.
This technology could also be used in airport security, city centre drunkenness patrols, shopping centre CCTV, etc.

39
New cards

Voiceprint Recognition

Voiceprint recognition involves capturing a person's unique voice characteristics, digitising this data, and storing it on a computer system, so that when entry/access is attempted or verification is needed, the voice is captured again, the new voiceprint is digitised and compared to the stored data, and entry/access or identification is confirmed if there is a match.

This technology could be used to access a room or building by speaking a name or keyword at the door. The person's voice needs to have been recorded previously and it needs to be compared / matched with the original before access is granted.

40
New cards

Factors that could affect Voiceprint Recognition

• High background noise
• Cold / sore throat
• Recording and playing back of the original voice (to gain unauthorised access)

41
New cards

Benefits of biometrics

• Biometric data is unique to a person and cannot be transferred, which reduces the risk of impersonation
• Biometric data is very difficult to copy, steal or imitate (unlike PINs, signatures, etc)
• It is not possible to "forget," as it would be with access cards, PINs, etc

• Convenient

42
New cards

Concerns of biometrics

• Some people might see this use of biometrics as an infringement of privacy / modesty, etc, (personal liberty)
• People might also be concerned about the uses the data might be put to
• People might be concerned about physical damage (e.g. eye damage from repeated flash photography)
• Will not work if the original data capture was flawed (e.g. if criminals manage to have their data recorded and fraudulently become authorised)
• The facial recognition database could allow officials to carry out unauthorised surveillance by monitoring CCTV pictures.
• Possible errors in the system, (e.g. through misidentifying persons in poorly lit streets following a crime).

• If your biometric data is stolen you cannot change it like a password

43
New cards

What is authenticaiton?

Verifying a users identity by comparing data stored related to that person to data entered

44
New cards

What is identification?

Determining a persons identity by comparing data entered to all data stored in the database (like CCTV criminal recognition)

45
New cards

What is FRR and FAR

FAR - False acceptance rate of biometric data giving access to a system

FRR - probability data incorrectly rejects a user

46
New cards

Disaster Planning

• Backups should be made
• Files should be archived off-site
• There should be an alternative system / hardware that can be replaced quickly
• There should be a back-up power supply
• Staff should be trained in recovery procedures
• It must be possible to rebuild the data

47
New cards

Types of malicious software

- viruses
- worms
- trojan horses
- spyware
- scare-ware/ransome ware
- Botnets

48
New cards

Virus

A virus is software that will attempt to spread over the network by infecting emails, removable storage devices, or known software vulnerabilities.
Once a virus is in play, it will deliver to one or more other pieces of software known as the payload.
The attack vector for a virus tends to be through emails or infected websites.

Will replicate itself onto other files or computers

49
New cards

Trojans

Trojans work in a similar way to viruses, only they are hidden in files or programs. When these files are opened, the Trojan is activated, delivering its payload.
Tricking users into downloading files or using illegal peer-to-peer networks is the most common attack vector for Trojans.

50
New cards

Spyware

Spyware is malicious software that runs secretly on a computer, unknown to the user. Rather than disrupting a computer or causing data loss, spyware tracks key presses and software use, which is then sent back to the hackers.
This is commonly used to commit identification fraud. The spyware attack vector tends to be from other malicious software, such as a virus.

51
New cards

Scare-ware/ransom-ware

Scareware software will try to scare the user into buying fake or further malicious software. It will pop up messages suggesting that your system is compromised and only their software can fix the problem, at a price.
Ransomware uses similar tactics but will delete, collect, or encrypt files, which they will then ransom back.
Ransomware can also take control of webcams.
Scareware tends to be used on compromised websites while ransom-ware tends to have an attack vector as the payload of a virus.

52
New cards

Botnets

Botnets will create a back door to your computer, allowing a hacker to use it without your permission.
The hacker will then use your computer as part of a larger group of compromised computers to launch further attacks, normally denial of service.
Again, this tends to be the payload of a virus.

These may remain dormant for a while but will work after activiation and will generally spread it self by sending to other computers

53
New cards

Worm

A worm is malicious software that replicates itself and will spread to any machine in a network.
Unlike viruses, worms do not need to be attached to a file to run.
A worm infects a computer by being downloaded or over a network connection.
It will also disrupt a machine or network and cause data loss.

54
New cards

How does malware generally infect a device?

  • Exploiting technical vulnerabilities in a firewall or other software (Worms or botnets)

  • Are downloaded online by mistake (Trogans or adware or ransomeware)

  • Are downloaded as part of a social engineering scam (malicious email attachments or phishing links) (Toragans or spyware)

  • Infected removable media (Viruses or spyware)

  • Spread on a network

55
New cards

Protection against malware

Install virus protection software, also called anti-virus software - each virus has its own unique'signature’ that is known to virus protection software and stored in a database. Data stored on a computer system is scanned to see if any of the virus signatures within the database exist on the system. There are many thousands of known viruses, and new viruses are created daily. Virus protection software therefore needs to be updated regularly to combat these.

Use a firewall - A firewall can be a software or hardware security system that controls the incoming and outgoing network traffic. Packets of data are analysed to determine whether they should be allowed through or not.

Keep your operating system up to date - New ways to bypass the operating system’s built-in security are often discovered and can be covered by installing the security patches issued by the operating system manufacturer.

Staff training - make sure staff know how to stop malware and scams

56
New cards

What are the three types of hackers?

- Black hat hacker
- Grey hat hacker
- White hat hacker

57
New cards

Black hat hacking

Black hat hackers will break into systems for their own purposes without permission.
This could be for financial gain, political motivation, to test their skills or just for fun.

Generally will install malware, or modify or steal data when agained access.

58
New cards

White hat hacking

White hat hackers will use their skills to break into a system to expose flaws and then advise on how they will be fixed with permission.
They will work directly for the company, or are hired by that company, to perform penetration testing, which identifies vulnerabilites with the system

After access is gained will generally report on flaws of the system

59
New cards

Grey hat hacking

Grey hat hackers are like white hat hackers, who are not directly hired by a company but perform penetration testing anyway to expose flaws. Without prior authorisiation
The hope is that they will be hired by the company, but more often than not, they are prosecuted under the Computer Misuse Act.

Once access is gained will generally disclose these vulnerabilities

60
New cards

Penetration testing

Penetration testing is done by all three types of hackers and involves trying to break into a system by exploring vulnerabilities in the OS, application flaws, poorly configured systems and user behaviour.
The goal of this testing is to find flaws in the security in order to exploit them or fix them, depending on who is doing the testing.

For a white hat hacker this is authorised assessment or security to indentify vulnerabilities in software. It involves simulating an attack on a system by exploring weaknesses in (applications, the OS, user behaviour, network configuration)

61
New cards

What are the 5 phases of Penetration Testing?

1. Reconnaissance (Information gathering)
2. Scanning (Indetifying vulnerabilities)
3. Gaining access
4. Maintaining access (To test damage)
5. Clearing tracks/Reporting findings

62
New cards

Reconnaissance

Reconnaissance is all about collecting as much publicly available data as possible.
This could include software in use, names of employees, IP addresses, and other such data.
The key here is not to set off any alarm bells by trying to access protected information too early.
Once this is done, phase two will start, which will probe the system defences in more detail.

63
New cards

Scanning?

This tage involves probing system defences in more detail. Scans are done on available ports, software bersions are found, and addresses of public computers are found to create a blueprint of the system

64
New cards

Ganing access?

Once a blueprint is created vulnerabilities are identified and may be expolited (such as out of date software with unpatched security flaws)

65
New cards

Maintaining access/report findings?

A malicious attacker may try to change passwords or create a back door to the system or future access. And they then would clear logs to hide their tracks and avoid fines or jail time.

An authorised peneration tester would document and report findings to the company

66
New cards

What are the types of penetration testin? And definitions

Black box - No internal knowledge or permissions for the system

White box - Given insider permissions and knowledge of the system to simulate an employee

67
New cards

How are files and data protected from security risks?

  • Administrative controls (staff training, company policy on things like passwords)

  • Authentication cotnrols (2FA, Strong password policies)

  • Access controls (permisson levels)

  • Physcial controls (Secure disposal of documents, Locking of sensitive data)

68
New cards

What is contigency planning?

A contignecy plant outlines procedures an organisation follows to maintain or restoer operations after a disruption.

Its aimed to procted Availability and integrity of data through recovery procedures.

69
New cards

What are some examples of distaters that you would need to recover from?

  • Natural disasters (floods, fire)

  • Hardware failure

  • Cyber attacks

  • Power outages

70
New cards

What are key elements of a contignecy plan?

  • Backups regularly taken and tested for recovery

  • Off-site or cloud storage

  • Redundant systems (fail safe)

  • Clear recovery procedures for employees

  • Defined roles and responsibilities

  • Business continuity planning

71
New cards

What is a Recovery Time and Recovery Point objective?

RTO - How much downtime is acceptable for a system

RPO - How much data loss is acceptable