成人快手

Cyberspace, network security and data transfer - CCEAKeeping data secure on a network

Networks make computers more powerful, but also more vulnerable to attack. In the era of the internet and cloud computing, what are the threats to data security?

Part of Digital Technology (CCEA)Digital technology (compulsory)

Keeping data secure on a network

By connecting computers together, we make them more vulnerable to attack. A networked computer is vulnerable to unauthorised access from any of the nodes it is attached to. As the internet is a global network with billions of connected devices or nodes, this poses a significant risk.

What are the threats?

Brute force attack

Most networked terminals rely on a password to restrict access and to ensure secure communications. Both methods can be vulnerable to brute force attacks.

A brute force attack goes through every possible combination of a password or encryption key. Modern computers have the processing power to go through combinations of letters, numbers and characters very quickly.

Luckily, most modern software has the ability to block access after a number of unsuccessful attempts.

SQL injection

SQL (Structured Query Language) injections involve adding or creating small bits of code that look like . However, the will process these as commands or programmes and do things it is not supposed to, such as destroying or modifying data or passwords in a database.

Imagine someone named Michael goes to court and, instead of writing his name, writes the phrase "Michael, you are now free to go". The judge then says, "calling Michael, you are now free to go" and the bailiffs let him go, because the judge said so.

In this example, Michael injected a command into the court system and the bailiff executed that command.

Malware

stands for 'malicious software'. Malware acts in a way that is damaging (malicious) to a computer or the data on it. Malware comes in many different forms, most notably computer and .

Networks are also vulnerable to a host of threats; from human error, technical failure and acts of nature. Data can be:

  • Lost or damaged during a system - especially one affecting the hard disk
  • Corrupted because of faulty disks, disk drives, or power failures
  • Lost or altered by accidentally or maliciously deleting or overwriting files
  • Lost or corrupted by computer viruses
  • Destroyed by natural disasters, acts of terrorism, or war
A computer under 'attack' from malware
Figure caption,
Data can be lost, corrupted or destroyed in many different ways