Data Security and Control
Data Security and Control
Data Security and Control
Definitions
Security: - Degree of resistance to, or protection from harm. Applies to any vulnerable and valuable
assets e.g. data, information or computer systems.
Privacy: - Ability of a system to seclude itself, or information about itself. Encompasses appropriate use
and protection of information.
These include:
Unauthorized access to data
Data alteration
Malicious destruction of hardware and Software
Malicious destruction of network resources, and sabotage
Data security provide security, integrity and safety of information systems. The following are the major security
threats and the control measures for each case
1. Information system failure
This include: -
Hardware failure
Unstable power supply due to brownout and black out
Network breakdown
Natural disaster
Program failure
1
Hoax Viruses – Come as emails with attractive messages and launch themselves when the email is
opened
Trojan Horses – They appear to perform useful functions but carry out undesirable activities in the
background
Worms – Malicious program that self-replicates hence clogs the system memory and storage media.
Backdoors – Maybe Trojan or a worm that allows hidden access to the computer system
3. Physical Theft
Refers to physical theft of computer hardware and software
4. Piracy
The illegal distribution and/or reproduction of software/data/information protected by copyright for business or
personal use.
Kinds of Piracy
End User Piracy: - This is the use of multiple copies of a single software package on several systems or
distributing registered/licensed copies of software to others. This also includes use of cracked software.
Reseller Piracy: - Occurs when unscrupulous persons distributes multiple copies of a single software
package to different customers. This also includes preinstalling systems with software without providing
original manuals and CDs; and when persons knowingly sell counterfeit versions of software to
unsuspecting customers.
Trademark/Trade Name Infringement: - Occurs when individual dealers claim to be authorized either
as a technician, support provider or reseller or improperly using a trademark/trade name.
Internet Piracy: - Occurs when there is an electronic transfer (upload/download) of copyrighted
software.
2
5. Fraud
Refers to stealing by false pretense. Fraudsters can be company employees, and Non-existence Company that
purports to offer internet services.
6. Sabotage
Illegal destruction of data and information with the aim of crippling service delivery. It’s carried out by
disgruntled employees and competitors with the aim of causing harm to an organisation.
COMPUTER CRIMES
Computer crimes encompasses a broad range of potentially illegal activities but can be generally divided into
two:
1. Crimes that target computer networks or devices directly
Malware
Denial of service
Computer Viruses
2. Crimes facilitated by computer networks or devices, the primary target of which is independent of the
computer network or device
Cyber stalking
Fraud & Identity theft
Phishing scams
Information warfare
4
Personal data should not be kept longer than necessary.
Data must be processed in accordance to the data subjects.
Appropriate security measures must be taken against unauthorized access.
Individuals should be informed about the data stored and should be entitled to have access to it
and be able to correct errors.
Personal data cannot be transferred to countries outside the EU unless the country provides an
adequate level of protection.
2. The Computer Misuse Act: -Before this act it was impossible to prosecute a hacker. The act created 3
offences:
Unauthorized access to private data (viewing data that you are not authorized to see)
Unauthorized access with the intent to commit or facilitate commission of further
offenses/hacking
Unauthorized modification of computer programs.
3. Copyright Designs and Patents Act: -Protects software developers from having their software copied
and printed (piracy). It stipulates that it’s illegal to:
Copy software without the permission of the rightful owner.
Run copied/pirated software
Transmit copied software over a telecommunications line.
4. Others
ICT related Acts in Kenya - For example, the science and technology act, Cap. 250 of 1997.
This is an act of parliament capable of dealing with information security.
Kenya ICT Policy - For example, the National information & Communication Technology
policy that seeks to address information security.
Family Education rights and privacy Act (USA) - Is a USA federal law that protects the
privacy of student education records.
Security Breach Notification Laws – Most countries require businesses, NGOs and state
institutions to notify consumers when unencrypted confidential data is compromised, lost, or
stolen.
ICT and Copyright
Copyright is an important issue in information security and penalties for breach can be high for an
individual/organization.
Important Principles
A software licensee never takes ownership of the copyright in the software; he/she merely purchases the
license to use the software under the terms and conditions set by the copyright owner and the law.
5
Copyright exists in the work from the moment of its creation
Remedies for civil copyright infringement may include damages to compensate the copyright owner for
damage caused to his business, including reputation and loss of sales
Criminal penalties can include ultimate fines and 2-year infringement or both
The rental of software is illegal without the express permission of the copyright holder
If an organization is using illegal copies of software, the organization may face not only a civil suit, but
corporate officers and individual employees may have criminal liability.