Welcome to the World of Data Security!
In this chapter, we are going to learn how to keep computer systems and the data inside them safe. Think of your digital life—your photos, messages, and bank details. How do we stop people from stealing them, and how do we make sure the data doesn't get corrupted? By the end of these notes, you'll understand the "shields" and "swords" used in the digital world to protect information.
Don't worry if some of these terms seem new. We’ll break them down step-by-step with plenty of examples!
1. The Three Pillars: Security, Privacy, and Integrity
Before we dive into the "how," we need to understand the "what." Students often confuse these three terms, but they are very different!
Security
Security is about protecting the data and the system from unauthorized access or damage. It’s like the lock on your front door and the alarm system in your house.
Privacy
Privacy is about who has the right to see the data. Even if data is secure, if a company sells your email address to advertisers without your permission, your privacy has been breached. It’s about keeping your personal business personal.
Integrity
Integrity is about accuracy and consistency. Data has integrity if it is correct and hasn't been changed by mistake or by a hacker. If you send $100 to a friend, but the bank's computer accidentally changes it to $10, the data has lost its integrity.
Memory Aid: The "Locked Box" Analogy
Imagine a diary in a safe:
1. Security: The safe is locked so no one can steal the diary.
2. Privacy: Only you have the key because you’re the only one allowed to read it.
3. Integrity: No one has snuck in and scribbled over your words; the writing is exactly as you left it.
Quick Review:
• Security: Protection from unauthorized access.
• Privacy: Controlling who can see the data.
• Integrity: Ensuring the data is accurate and unchanged.
2. Threats: Who (or What) is trying to get in?
To defend a system, we need to know what we are fighting. Here are the common threats mentioned in your syllabus:
Hackers
A hacker is a person who tries to gain unauthorized access to a computer system. Some do it for fun, some to steal, and some to find weaknesses to help fix them.
Malware
Short for "Malicious Software." This is code designed to disrupt or damage a system. Two key types are:
• Virus: A piece of code that replicates itself and attaches to other programs. It "infects" the computer, often deleting files or slowing things down.
• Spyware: Software that hides on your computer and spies on you. It can record your keystrokes (keylogging) to steal passwords and credit card numbers.
Phishing
This is a trick where a criminal sends a fake email or message pretending to be a real company (like your bank). They try to "bait" you into clicking a link and entering your private login details.
Pharming
This is more "high-tech" than phishing. Pharming installs malicious code on a computer or server that misdirects you to a fake website, even if you typed the correct web address in your browser! You think you are on www.mybank.com, but you are actually on a hacker's copy.
Key Takeaway: Phishing uses fake messages to lure you; Pharming uses malicious code to redirect you.
3. Security Measures: Building the Shield
How do we protect a stand-alone PC or a network? We use a combination of different measures.
User Accounts and Passwords
The most basic level of security. Each user has a unique User ID and a Password. This ensures the system knows exactly who is logging in.
Biometrics
Using unique physical characteristics to identify a person. Examples include fingerprint scans, facial recognition, or retina scans. These are much harder to steal or "guess" than a password!
Firewalls
A firewall acts as a gatekeeper between your computer/network and the internet. It examines all incoming and outgoing data (traffic) and decides whether to allow it or block it based on a set of rules.
Digital Signatures
This is used to verify that an electronic document or message is authentic. It proves that the sender is who they say they are and that the message hasn't been tampered with.
Encryption
Encryption scrambles data into a "secret code" called ciphertext. Even if a hacker steals the data, they won't be able to read it without the decryption key.
Anti-virus and Anti-spyware
Software that scans your files and incoming data for known "signatures" of malware. If it finds a virus, it "quarantines" (locks away) or deletes it.
Did you know? No single security measure is perfect. This is why experts use layered security—using many of these methods together!
4. Data Integrity: Keeping Data Correct
Even if hackers aren't involved, data can become incorrect due to human error during typing or electrical interference during transfer. We use Validation and Verification to stop this.
Data Validation
Validation is an automatic check done by the computer to ensure the data entered is reasonable and follows certain rules. It cannot check if the data is 100% true, only that it is "allowed."
Common validation checks:
• Range Check: Checks if a number is between two values (e.g., a month must be between 1 and 12).
• Format Check: Checks if data follows a pattern (e.g., a postcode must be LLNN NLL).
• Length Check: Checks if the data has the right number of characters (e.g., a password must be at least 8 characters).
• Presence Check: Ensures a field isn't left empty.
• Check Digit: An extra digit calculated from the other digits in a number (like a barcode). If the digits are typed wrong, the calculation won't match the check digit.
Data Verification
Verification is checking if the data entered matches the original source.
During Data Entry:
• Visual Check: The user looks at the screen and compares it to the paper document.
• Double Entry: Entering the data twice (like when you create a new password). If the two entries don't match, the computer flags an error.
During Data Transfer:
When data moves from one computer to another, it can be corrupted by "noise" on the wires. We check this using:
• Parity Check: A parity bit is added to a byte. In Even Parity, the bit is set so that the total number of 1s in the byte is even. If a byte arrives with an odd number of 1s, the computer knows an error occurred.
• Checksum: A value is calculated from a block of data before it is sent. The receiver does the same calculation. If the "sums" don't match, the data is corrupted.
Example of Even Parity:
Data to send: \(1011001\)
Count the 1s: There are four 1s (which is even).
Parity bit added: \(0\)
Final byte: \(10110010\)
Common Mistake: Thinking Validation and Verification are the same.
• Validation: Does it follow the rules? (e.g., Is your age a number?)
• Verification: Is it what you meant to type? (e.g., Did you type 15 instead of 51?)
Quick Review Box:
• Range/Format/Length/Presence: Validation methods.
• Visual/Double Entry: Entry verification.
• Parity/Checksum: Transfer verification.
Final Summary Takeaway
Security is about protecting systems (firewalls, passwords), Privacy is about protecting rights, and Integrity is about protecting accuracy (validation, verification). Threats like malware and phishing are constantly evolving, so we use multiple layers of defense to keep our digital world running safely!
Great job! You've just covered the core concepts of Computer Science Security. Take a quick break and try to explain the difference between Phishing and Pharming to a friend—it’s the best way to make the knowledge stick!