Describe security methods designed to protect the security of data
Resources |
Subject Notes |
Computer Science
Cambridge A-Level Computer Science 9618 - 6.1 Data Security
Data Security - Methods for Protection
Introduction
Data security is crucial in modern computing to protect information from unauthorized access, use, disclosure, disruption, modification, or destruction. This section describes various security methods designed to safeguard data.
Authentication
Authentication is the process of verifying the identity of a user, device, or system attempting to access resources.
- Passwords: A secret string of characters used to prove identity.
- Two-Factor Authentication (2FA): Requires two or more verification factors, such as a password and a one-time code from a mobile app.
- Biometrics: Uses unique biological characteristics like fingerprints, facial recognition, or iris scans.
- Smart Cards: Physical cards containing an embedded chip used for authentication.
- Digital Certificates: Electronic documents that verify the identity of a user or website.
Access Control
Access control mechanisms restrict who can access specific data or resources and what actions they can perform.
- Discretionary Access Control (DAC): The owner of a resource decides who has access.
- Mandatory Access Control (MAC): The operating system enforces access rules based on security classifications.
- Role-Based Access Control (RBAC): Access is granted based on a user's role within an organization.
- Attribute-Based Access Control (ABAC): Access decisions are based on a combination of attributes of the user, resource, and environment.
Encryption
Encryption transforms data into an unreadable format (ciphertext) using an algorithm and a key. Only those with the correct key can decrypt the data back to its original form (plaintext).
Type of Encryption |
Description |
Example Algorithms |
Symmetric Encryption |
Uses the same key for encryption and decryption. Faster than asymmetric encryption. |
AES, DES |
Asymmetric Encryption |
Uses a pair of keys: a public key for encryption and a private key for decryption. Slower but more secure for key exchange. |
RSA, ECC |
Hashing |
Creates a fixed-size string (hash) from data. One-way process; cannot recover the original data. Used for integrity checks. |
SHA-256, MD5 (less secure) |
Integrity Protection
Integrity protection ensures that data has not been altered or corrupted during storage or transmission.
- Hashing: As mentioned above, hashing can be used to detect changes in data.
- Message Authentication Codes (MACs): A cryptographic hash that is generated using a secret key, providing both data integrity and authentication.
- Digital Signatures: Use asymmetric encryption to verify the authenticity and integrity of a message or document.
Malware Protection
Malware (malicious software) is designed to harm computer systems. Protection methods include:
- Antivirus Software: Detects and removes viruses, worms, and other malware.
- Firewalls: Control network traffic to prevent unauthorized access.
- Intrusion Detection/Prevention Systems (IDS/IPS): Monitor network traffic for malicious activity and take action to prevent attacks.
- Regular Software Updates: Patch security vulnerabilities in software.
- User Education: Educating users about phishing and other social engineering attacks.
Data Loss Prevention (DLP)
DLP strategies aim to prevent sensitive data from leaving an organization's control.
- Content Filtering: Prevents sensitive content from being transmitted.
- Data Masking: Obscures sensitive data while still allowing it to be used for testing or development.
- Encryption: Encrypting data at rest and in transit.
Physical Security
Protecting the physical infrastructure that stores data is also essential.
- Secure Data Centers: Controlled access, surveillance, and environmental controls.
- Physical Access Controls: Locks, security guards, and biometric scanners.
Secure Communication
Ensuring data transmitted over networks is protected.
- Secure Shell (SSH): Encrypts network traffic.
- HTTPS: Encrypts communication between a web browser and a web server.
- Virtual Private Networks (VPNs): Create a secure tunnel for network traffic.