Unit 3 - Data - Security - and - Management - Image.Marked
Unit 3 - Data - Security - and - Management - Image.Marked
Unit 3 - Data - Security - and - Management - Image.Marked
Structure
3.0 Introduction
3.1 Objectives
3.2 Database security and Data Management
3.3 Security Requirements (CIA)
Check your progress1
3.4 Security Threats and Attacks
Check your progress2
3.5 Computer, Mobile and Internet
3.5.1 Limitations
3.6 Security Measures and Solutions
Check your progress3
3.7 Security Policy
3.8 Security Management
3.9 Security Audit
Check your progress4
3.10 Security and Usability
3.11 Summary
3.12 Solutions/Answers
3.13 References/ Further Readings
3.0 INTRODUCTION
The tremendous and intensive use of information for several different tasks makes data
security, trustworthiness and privacy increasingly critical for these functionalities’ in day-to-
day living. The protection of data from unauthorised access, use, change, disclosure and
destruction by using methods to ensure network security, physical security and file security
based on a collection of standards and technologies that protect data from intentional or
accidental destruction, modification or disclosure is known as data security. Data security can
be applied through various techniques and technologies including administrative controls,
organizational standards, etc. and other safeguarding techniques that limit or preclude access
to unauthorized or malicious users or processes.
The fundamental question which emerges from this extensive use of data is that why is it
important to secure this data and how is this object to be achieved.
Different organizations create, collect, store, receive or transmit data within an organization
as well as between organizations/associations and individuals or from one organization to an
organization. It doesn’t matter what device, technology or process is employed to manage,
store, collect or distribute data, but it must be protected as data breaches may result in
litigation and huge penalties alongside damage to an organization’s reputation. Therefore, the
importance of protecting data from security threats is more important today than ever before.
Threats to database are often numerous which can either be accidental or intentional and in
either case security of the database and the entire system, including the network, operating
system, the physical area where the database resides and the personnel access all have to be
considered and protected accordingly.(Sie Learning, Sydney, 2020, p.1)
A data security plan which includes procedures both physical and virtual through extensive
use of data management software is required to be put in place.(Michael Buckee, 2020, p.1)
3.1 OBJECTIVES
After studying this unit, you will be able to:
Explain what is data security
Explain data management
Explain security requirements
Explain security threats and attacks
Security measures and usability
Security management
3.2 Data security and Data Management
Database security is necessary in the following situations:
Theft and fraud
Loss of availability of data
Loss of confidentiality
Loss of data privacy
Loss of data integrity
The situations given above are the most likely to be exposed to date security threats and are
required to be protected so that the chances of losses in this regard can be significantly
reduced.(The National Academics Press, 1991, ch. 4, p. 49-73)
It is noteworthy that these situations often cause cumulative losses due to inter dependencies
and hence a loss due to one situation can affect multiple areas in the same organisation.
The purpose of data protection (also known as information privacy and data privacy) is to
define when and under what circumstances data can be safely put to use
Data management
The main aim of data management helps people and organizations for data to be used within
the boundaries of policies and regulations for the maximum benefit of these organizations
and businesses and therefore is very valuable as an intangible asset. Data management can be
achieved by the practise of collection, keeping and usage of data in a secure, efficient and
cost-efficient manner.
Therefore, efficient ways and means are sought by various organizations for data
management. The management of data is done through various platforms and include
databases, data analysis and more such tools like Microsoft SQL server, Google cloud,
Amazon web services, etc.
1. Data management is the responsible stewardship of data throughout its lifecycle. There
are five components to data management:
Acquisition
Utilization
Maintenance
Access
2
Protection
Effective data management requires appropriate acquisition, utilization, maintenance,
access, and protection of data. Data management depends on
information confidentiality and criticality.
Integrity
Integrity pertains to safeguarding the accuracy of data as it travels through workflows.
There should be measures taken to protectdata from unauthorized deletion or
modificationand to quickly reverse the damage in the event of a breach. (ShyamOza,
2019, p.1)
Availability
Availabilitymeans providing seamless and continuous access to users through robust
servers and network infrastructure with high availability mechanisms built into system
design (ShyamOza, 2019, p.1).
Some practices for implementation of CIA Triad of confidentiality, integrity and availability
are as follows:
i) Putting confidentiality into practice
Categorization of data and assets being handled by individuals in an organization
based on their privacy requirements.
Requirement of all data encryption and two-factor authentication to be basic
security hygiene as a fundamental practice in all organizations dealing with
sensitive information.
3
Ensure that access control lists and file permissions are monitored and updated
regularly by professionals from the IT department in an organization.
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------
4
iii) Cyber-physical attacks- The technology that has enabled to modernize and
computerize critical infrastructure also brings risk. There is an ongoing threat of
hacks targeting electrical grids, transportation systems, etc., which represent a
major vulnerability.
iv) State-sponsored attacks- Hackers look to make profit through stealing individual
and corporate data. Now even nation states use cyber skills to infiltrate other
governments and perform attacks on critical infrastructure. Cyber crime today is a
major threat not only to the private sector and individuals but also towards the
governments and nations as a whole.
Many such attacks target government-run systems and infrastructure, but private
sector organizations are also at risk.
Please answer the following Self-Assessment Question.
Check your progress2 Spend 3 Min
What are the various types of cyber threats?
----------------------------------------------------------------------------------------------------------------
----------------------------------------------------------------------------------------------------------------
--------------------------------------------------------------------------------------------------------------
COMPUTER
A computer in layman terms is essentially a machine that was primarily used for calculations.
Over the years, the use of a computer has grown two-fold; it not only helps in storing work
related information but also has the capacity to transfer communication from one system to
another with the help of the Internet.
Computers today have reduced complicated jobs into much simpler tasks. For example, one
can write a letter in a word document, edit it, spell check, print copied and also send it to
someone across the world in a mere matter of seconds. These activities of simply even
writing a letter would have taken someone days, to do before the advent of computers.
5
In other words, a computer simply is an information processor in a way that it takes whatever
raw information or data which is fed by a human and stores that information, then proceeds to
decrypt the information entered and consequently provide the result in the form of an output.
The work of a computer is nothing without a computer program. We can see various
computer programmes on a computer we rely on like Microsoft Word, Excel, etc. used for
carrying out day to day activities at all spheres of life.
MOBILE
The world of digital technology has led to the evolution of various devices that are used for
day to day purposes. A computer system is one that cannot be carried by an individual to
every place. Therefore, foreasy use of electronic devices and to avail benefits of a computer
system a mobile was invented.
A mobile device in essence is a general term used for a handheld computer or a smartphone.
The mobile devices invented not only has functions of making calls, receiving calls, sending
and receiving text messages, but all contains functions of obtaining emails and carries out
functions of a computer system at a smaller level.
A mobile as per defined by digital technology refers to a cell phone usually one with
computing ability, or a portable, wireless computing device used while held in the hand, as in
mobile tablet, mobile, mobile app, etc.
The success of a mobile’s technology has risen in today’s world due to possession of a
smartphone which has access to Internet and can be used to connect to multiple users
wherever and whenever required.
Characteristics of a mobile device (Priya Viswanathan, 2019, p.1):
Wi-Fi or cellular access to the Internet
A battery that powers the device for several hours
A physical or onscreen keyboard for entering information
Touch-screen interface
Ability to download data from the Internet
Different meanings of mobile
In different contexts, mobiles are also defined as “mobile development”, “mobile-friendly”,
etc. The term “mobile development” usually refers to creating apps for smartphones, but does
not include laptops. “Mobile friendly” on the other hand refers to websites that are easy to
use by any user owning a smart phone.
INTERNET
Merriam-Webster’s dictionary defines Internet as an electronic communications network that
connects computer networks and organizational computer facilities around the
world.(Merriam-Webster Dictionary, 2020, p.1)
There are various devices that help facilitate connections with people around the world with
the help of a network. These multiple interconnected networks form the Internet.
How does a user access the Internet?
6
The answer is simple. A single device that is assigned with an address when it connects to the
Internet known as the Internet protocol (IP) address and this address helps in differentiating
between devices in the network form all other devices.
Almost every connection to be made with the Internet requires a device which includes an
address for sending/receiving messages in the form of emails. Mobile phones too, operate
within a network based on services that are provided by service providers. They convert our
voice into electronic signals which are then transmitted through radio waves. The same then
get converted back into a sound once it reaches another mobile phone.
The use of Wi-Fi has grown two-fold due to connection to the Internet wirelessly. The
concept of free Wi-Fi is now commonly available in public places such as airports, cafes, etc.
3.5.1 LIMITATIONS
Like every technology that has advanced every day, the risks too increase. Even a mobile
phone/device and a computer having an Internet technology has its limitations. Some of them
are mentioned below:
Speed- Speed of the Internet is very essential for complete usage of a mobile device. If
the speed of an Internet connection is slow, it results in lagging or slows down of the
device and crashes which then renders the mobile device unusable.
Accessibility- Websites though easily accessible on laptops may not be easily accessible
on a mobile device as the website may not have implemented mobile versions.
Therefore, a mobile phone may not always get the desired website to be accessed by a
user.
Incompatibility- Mobile web browsers are not the same as a laptop or a computer web
browser works. Therefore, some web browsers may be incompatible with mobile
operating systems.
Leakage of data- Mobile apps often provide free apps in the form of advertisements,
which usually do not undergo malware tests to ensure safety of the app. Therefore, users
downloading such mobile apps make themselves liable to unintentional data leakages
relating to personal data.
Use of unsecured Wi-Fi- Users of internet want to preserve their cellular data for the
long run or to not receive hefty phone bills and therefore rely on free Wi-Fi networks. At
time such free Wi-Fi network are unsecured and leads to compromise of data security
which is liable to be hacked by technology users.
SMishing- This type of scam is similar to the phishing scam wherein cybercriminals ask
users to download malware by clicking on malicious links. The method of SMishing
scam is done through text messages instead of email like in the case of phishing scams.
Data encryption- Data when kept unencrypted leads to misuse of personal data by
cybercriminals. Therefore, data has to be encrypted by usage of unique encryption codes,
so as to avoid leakage of vital information stored in databases. When data has been
encrypted and only the user has access to such a data has the decryption code, results in
prevention of data theft.
Email security-It is a form of procedure to protect an email account and the contents on
an email account from unauthorised access. Therefore, measures like strong email
passwords, end-to-end encryption of emails or messages that are sent from one person to
another result in prevention of misuse of data, as emails are a popular forum for hackers
to spread malware, spam and phishing attacks. For example- end-to-end encryption used
by WhatsApp.
Third party issues- Website’s play a major role while showcasing an organization’s
success. Therefore, they implement third party tools to make their websites’ more
interactive and user-friendly and offer smooth connectivity for user interaction. These
third-party tools help in generating revenue for an organization’s website. Therefore, an
organization has to undertake to ensure that all reasonable steps have been taken prior to
giving access to third party service providers and that such third-party service providers
apply the stringiest security measures.
Strong firewall- Firewall of a system is part of such system’s cyber security measure. A
firewall enables to protect a system from internet traffic and services it is exposed to.
These services are accessed by everyone who uses an internet. Therefore, firewalls
enable to control who gains access to an organization’s system like insider attacks which
may originate from within a network used by an organization. Antiviruses are for files
and firewalls are needed to protect from unauthorised access or usage of network. A
firewall simply helps to control Internet traffic that is generated by using a network for
work.
------------------------------------------------------------------------------------------------------------
-----------------------------------------------------------------------------------------------------------
9
Browser JSGuard is a device which fills in as a program augmentation which distinguishes
and protects malicious HTML and JavaScript attacks. It warns the user while visiting
malicious web pages and provides a comprehensive threat analysis report of the web page.
2. Integrity of data or systems- System and data integrity is linked to the procedures,
policies and controls which are used to guarantee that data has not been modified in an
unconstitutional way and that systems are liberated from illicit manipulation that would
compromise precision, comprehensiveness and consistency.
5. Assurance- Assurance addresses the procedures, strategies and controls which are used to
create certainty that specialized and equipped security measures are working as
anticipated.
6. Privacy- It centres on the constitutional rights of people, the motivation behind data
assortment and processing, security predilection and the manner in which organizations
administer individual’s data. It focuses on how to gather, process, offer, document and
erase the information/data as per the law.
-------------------------------------------------------------------------------------------------------------
------------------------------------------------------------------------------------------------------------
3.11 SUMMARY
The protection of data from unauthorised access, use, change, disclosure and destruction by
using methods to ensure network security, physical security and file security based on a
collection of standards and technologies that protect data from intentional or accidental
destruction, modification or disclosure is known as data security. Data security can be applied
through various techniques and technologies including administrative controls, organizational
standards, etc. and other safeguarding techniques that limit or preclude access to unauthorized
or malicious users or processes.
Database security is necessary for the following situations:
Theft and fraud
Loss of confidentiality or secrecy
Loss of data privacy
Loss of data integrity
Loss of availability of data
In some conditions, these areas are directly related such that an activity that results in a loss
in one area can also cause a loss in another since all of the data within an organization are
interconnected.
Data management is the practice of collecting, keeping and using data securely, efficiently,
and cost-effectively. The goal of data management is to assist people, organizations and
connected things optimize the use of data within the bounds of policy and regulation in order
that they will make decisions and take actions that maximize the benefit of the
organization.(Oracle, 2020, p.1)
The main objective of data security is to protect the data which an organization directly owns
or that which belongs to third party while this data is being received, collected, stored created
or shared, as the case maybe.
There is no difference as to which device, technology or process is utilized to manage, store
or collect data, and it must be protected. Data breaches may result in litigation cases and huge
12
fines, but it may also lead to damage an organization’s reputation. The importance of
shielding organizations, individuals and business’ data from security threats is more
important today that it’s ever been.
The core elements of data security are confidentiality, integrity and availability. Also known
as the CIA triad, this is a security model and guide for organizations to keep their sensitive
data protected from unauthorized access and data exfiltration. (Michael Buckbee, 2020, p.1)
The information technology industry continues to suffer from a severe shortage of cyber
security professionals and experts constantly warn that the stakes are higher than ever. The
rise in cybercrime epidemic even risks shaking the public faith in such cherished ideals as
democracy, capitalism and personal privacy.
The following cyber security threats are on the rise and posing a risk to data privacy:
i) Phishing attacks
ii) Ransomware attack
iii) Cyber-physical attack
iv) State-sponsored attack
The CIA triad though being a security model and guide for organizations to protect their
sensitive data there are a few other data security considerations that one should be aware of:
Access security
Data encryption
Email security
Risk-assessment analysis
Monitor effectiveness
Third party issues
Strong firewall
Antivirus protection
Back-up regularly
Security management means minimizing the interruption of business activities and reducing
the vulnerability to various attacks. Security bargains with distinctive trust aspects of
information.
Data security includes engineering where an incorporated permutation of appliances,
arrangements and resolutions, software, surveillance, and vulnerability scans work together.
3.12 SOLUTIONS/ANSWERS
Check Your Progress
3. These are:
i) Data encryption to ensure that personal data cannot be obtained illegally and be
misused by cyber criminals;
ii) Email security by end-to-end encryption so that only authorised individuals can access
encrypted data;
iii) Strong firewalls to protect from unauthorised access/usage of network;
iv) Antivirus protection to protect data;
v) Regular back-up to ensure that data is not lost or cannot be accessed by unauthorised
individuals.
4. Security audit deals with regular inspection of security measures implemented to protect
personal information. A security audit is conducted to give a reasonable way to scrutinize
how secure a site is and/or the information stored is also properly protected. Security
audit creates benchmarks for an organization to handle the shortcomings to security
measures which have been implemented.
14
Michael Buckbee (2020). Data Security: Definition. Explanation and Guide. p1-
12;.https://www.varonis.com/blog/data-security/
Oracle India. What is data management?p1-10;
https://www.oracle.com/in/database/what-is-data-management/
Priya Vishwanatha (2019). What is a mobile device?. p1-11;
https://www.lifewire.com/what-is-a-mobile-device-2373355
Priya Viswanathan ( 2019. p.1). https://www.lifewire.com/what-is-a-mobile-device-
2373355
ShyamOza (2019, p1). CIA Triad: Best Practices for Securing Your
Org.https://www.business2community.com/cybersecurity/cia-triad-best-practices-for-
securing-your-org-02232416.
The National Academics Press (1991). Computers at Risk: Safe Computing in the
Information Age. Ch-4. 49-73; https://www.nap.edu/read/1581/chapter/4
Unitag. What is mobile web?. P1-4. https://www.unitag.io/mobile-websites/
W3Schools. Database Security. p1-2; https://www.w3schools.in/dbms/database-
security/
15