Title: Data Protection
1Data Protection
- AS Computer Applications
- (2004-2005)
2Aims
- To ensure data is confidential
- No unauthorized access
- e.g. personal info. in computer system
- To ensure data is original
- Data have not been modified by a third party
- e.g. transaction information of on-line banking
3Methods
- User-rights restriction
- Password
- Encryption
- Physical Protection
- Backup
41. User-rights
- Lets browse the folder Test in the J (student
drive) - Lets open the file 123.ppt
- Lets execute the file draw.exe
- Lets delete the file abc.doc
What do you observe?
51. User-rights
- Lets open the Display Properties window
- Can you find the Setting Tab?
61. User-rights
- Rules that limit the actions of each user
- Prevent intentional and accidental damage
- Usually 3 user levels
- User
- Power User
- Administrator
71. User-rights
Administrator Group All modify the rights and
disable accounts of users
Power User Group modify files
User Group Basic read and execute files
82. Password
- most common way to prevent illegal access
User Name
- Only successful login can enter the system
- A mild way to prevent external damage (e.g.
hacking)
92. Password
- Dont let anyone knows your password
- Dont write down password
- Should be changed frequently
- Dont only use number as password
- Dont use passwords which can be easily guessed
- Names
- Birthday
- Words in dictionary
102. Password
Ahjke84
Hard to remember!
- Solution 1 Combine words without space or
punctuation mark
CANTGUESS
? cant guess
11- Solution 2 Take the first letters from a
sentence you can easily remember
IASISL
? I Am Studying In Shun Lee
- Solution 3 Mix words and numbers
SMILE497
? both the word smile and the number are
randomly chosen
123. Encryption
- A message is converted from original to a
incomprehensible form - Only the parties involved understand
- Using a key to encrypt and decrypt
- Example
School
133. Encryption
- Why Encryption?
- User rights restriction password can only
protect data inside the computer. - They cant protect data which is being
transmitted through the computer network
Hello
Hello
143. Encryption
- Public Key Infrastructure (PKI)
- a comprehensive system of technologies working
to enable users of the Internet to exchange
information securely, authenticated and
confidentially. - It consists of
- Users key pair (public key private key)
- Digital certificates
- A Certificate Authority
15PKI
- Each user is given a pair of keys
Private Key Public Key
- Using one to lock and the other one to unlock
- The keys are different from real keys
- They are algorithm/programs
- Calculations
- Schemes to decrypt/encrypt messages
16PKI
- Example
- Both Mr. Pau Mr. Kam have applied a Digital
Certificate - Each of them will be given a pair of Keys
17PKI
- Private key is kept with the owner
- Public key is kept by the middlemen Certificate
Authority
Certificate Authority (Hong Kong Post)
K
P
18PKI
- Sending a message (From Mr. Pau to Mr. Kam)
Hi, I am sending you the exam paper
Fdbeh28(!jkjs637chscs012jsakcn_at_
Hi, I am sending you the exam paper
19PKI
- Verifying the owners identity (authentication)
Hi, I am sending you the exam paper
Fdbeh28(!jkjs637chscs012jsakcn_at_
Hi, I am sending you the exam paper
20PKI
21PKI
- Advantages
- Owners keep their private keys
- Private key will not be sent over the Internet
- The private is very safe with the owner
- Certificate Authority
- Middlemen
- Keeping the identity of owners with their public
keys
224. Physical Protection
- Locate the computer system in a physically safe
place - Protect data from being damaged by sabotage
235. Backup
- What is backup ?
- A duplicate copy of a file or all files stored in
a disk. - Whats the purpose ?
- To protect a system from losing the valuable data
- Backup should be placed at a isolated place
245. Backup
- Different kinds of backup
- Full backup
- Differential backup
- Incremental backup
- Backup media (Magnetic Tape)
- Cheap
- Reliable
255. Backup
- Full Backup
- A copy of all records in a information system
identical
Backup
Damaged Database
265. Backup
- Advantages of full backup
- The safest way of backup
- Simple to backup and restore
- Disadvantages of full backup
- Time consuming
- The system should be offline while making backup
275. Backup
- Differential Backup
- A supplement of full backup
- Hold the transactions since last backup
Differential Backup
comparing
Differential Backup
285. Backup
- Incremental Backup
- Hold all transactions
One Transaction
295. Backup
- Advantages of DB IB
- Small backup file size
- Can be done in a short time(can be done very
frequently) - Disadvantages of DB IB
- Restoration is complicated