Describe security methods designed to protect the security of data

Resources | Subject Notes | Computer Science

Cambridge A-Level Computer Science 9618 - 6.1 Data Security

Data Security - Methods for Protection

Introduction

Data security is crucial in modern computing to protect information from unauthorized access, use, disclosure, disruption, modification, or destruction. This section describes various security methods designed to safeguard data.

Authentication

Authentication is the process of verifying the identity of a user, device, or system attempting to access resources.

  • Passwords: A secret string of characters used to prove identity.
  • Two-Factor Authentication (2FA): Requires two or more verification factors, such as a password and a one-time code from a mobile app.
  • Biometrics: Uses unique biological characteristics like fingerprints, facial recognition, or iris scans.
  • Smart Cards: Physical cards containing an embedded chip used for authentication.
  • Digital Certificates: Electronic documents that verify the identity of a user or website.

Access Control

Access control mechanisms restrict who can access specific data or resources and what actions they can perform.

  • Discretionary Access Control (DAC): The owner of a resource decides who has access.
  • Mandatory Access Control (MAC): The operating system enforces access rules based on security classifications.
  • Role-Based Access Control (RBAC): Access is granted based on a user's role within an organization.
  • Attribute-Based Access Control (ABAC): Access decisions are based on a combination of attributes of the user, resource, and environment.

Encryption

Encryption transforms data into an unreadable format (ciphertext) using an algorithm and a key. Only those with the correct key can decrypt the data back to its original form (plaintext).

Type of Encryption Description Example Algorithms
Symmetric Encryption Uses the same key for encryption and decryption. Faster than asymmetric encryption. AES, DES
Asymmetric Encryption Uses a pair of keys: a public key for encryption and a private key for decryption. Slower but more secure for key exchange. RSA, ECC
Hashing Creates a fixed-size string (hash) from data. One-way process; cannot recover the original data. Used for integrity checks. SHA-256, MD5 (less secure)

Integrity Protection

Integrity protection ensures that data has not been altered or corrupted during storage or transmission.

  • Hashing: As mentioned above, hashing can be used to detect changes in data.
  • Message Authentication Codes (MACs): A cryptographic hash that is generated using a secret key, providing both data integrity and authentication.
  • Digital Signatures: Use asymmetric encryption to verify the authenticity and integrity of a message or document.

Malware Protection

Malware (malicious software) is designed to harm computer systems. Protection methods include:

  • Antivirus Software: Detects and removes viruses, worms, and other malware.
  • Firewalls: Control network traffic to prevent unauthorized access.
  • Intrusion Detection/Prevention Systems (IDS/IPS): Monitor network traffic for malicious activity and take action to prevent attacks.
  • Regular Software Updates: Patch security vulnerabilities in software.
  • User Education: Educating users about phishing and other social engineering attacks.

Data Loss Prevention (DLP)

DLP strategies aim to prevent sensitive data from leaving an organization's control.

  • Content Filtering: Prevents sensitive content from being transmitted.
  • Data Masking: Obscures sensitive data while still allowing it to be used for testing or development.
  • Encryption: Encrypting data at rest and in transit.

Physical Security

Protecting the physical infrastructure that stores data is also essential.

  • Secure Data Centers: Controlled access, surveillance, and environmental controls.
  • Physical Access Controls: Locks, security guards, and biometric scanners.

Secure Communication

Ensuring data transmitted over networks is protected.

  • Secure Shell (SSH): Encrypts network traffic.
  • HTTPS: Encrypts communication between a web browser and a web server.
  • Virtual Private Networks (VPNs): Create a secure tunnel for network traffic.