Digital Security: Principles, Cryptography, Secure Programming Techniques

   

Added on  2023-04-21

16 Pages3334 Words170 Views
Running head: DIGITAL SECURITY
Digital Security
Module Title
Course Code
Student ID
Date of Submission
Digital Security: Principles, Cryptography, Secure Programming Techniques_1
2DIGITAL SECURITY
Table of Contents
Question 1: Digital Security Principles...............................................................................4
1.1 Introduction................................................................................................................4
1.2 Cyber-crime and its impact....................................................................................4
1.3 Description of the Computer Misuse Act..............................................................5
1.4 Consequences of breaking the Act........................................................................6
1.5 Real life examples of misuse of the Act................................................................7
1.6 Conclusion.................................................................................................................7
Question 2: Introduction to Cryptography...........................................................................8
2.1 Introduction................................................................................................................8
2.2 Risk of sensitive data.............................................................................................8
2.3 Security model.......................................................................................................8
2.4 Categories of encryption techniques......................................................................9
2.5 Recommendation and justification of the encryption algorithm...........................9
2.6 Long term impact of encryption..........................................................................10
2.7 Conclusion...............................................................................................................10
Question 3: Secure Programming Techniques..................................................................10
3.1 Introduction..............................................................................................................10
3.2. Importance of complex codes............................................................................11
3.3 Description of OWASP......................................................................................11
3.4 Three attacks which are common in the hospital industry.................................11
3.5 Conclusion...................................................................................................................12
4 Reference........................................................................................................................14
Digital Security: Principles, Cryptography, Secure Programming Techniques_2
3DIGITAL SECURITY
Question 1: Digital Security Principles
1.1 Introduction
The foremost determination of this report is to highlight the importance of the
Computer Misuse Act. The impact and the definition of the cyber crimes will be
highlighted in the paper along with the act which helps in safeguarding the digital
security of Ruskin City Council (Wall 2017). The report will discuss different aspects of
the act such as the consequences of breaking the act and real-life examples of the misuse
of the Act.
1.2 Cyber-crime and its impact
Cyber Crime can be defined as the type of crime in which computer systems are
used to commit a crime. All the illegal internet-based activities can be considered as the
cybercrime and it has a very negative effect on our society. There are different categories
if cyber-crimes such as phishing emails and child pornography. Computers are the object
of the cybercrimes and the cybercriminals uses extensive and innovative methods for
different categories of cybercrimes (Nishchal 2018). Cyberstalking is the other examples
of the cyber-crimes along with that the ransomware attacks also falls under this category.
Severe business loss and loss of reputation are the most negative impact of the
cybercrimes. Apart from the economic impact of the cybercrimes, there are numerous
technological impacts of the cybercrimes as well such as the delay in the implementation
of new technology in a business environment (Hatta et al. 2018). Some of the real-life
examples of cybercrimes are ethical hacking, identity theft and transaction frauds. The
recent online scams also fall under the category of the cyber-crimes along with this the
SQL injections attacks are also considered as one of the deadliest cyber-crimes (Barker
Digital Security: Principles, Cryptography, Secure Programming Techniques_3
4DIGITAL SECURITY
2017). DoS or the Denial of Service and MitM attack are the other examples of the
cyber-crimes.
1.3 Description of the Computer Misuse Act
Introduced in the year 1990 in the parliament of United Kingdom, the Computer
Misuse Act helps in providing digital security to the computer users (Kumbhar and
Gavekar 2017). The act highlights on three criminal offences such as the unauthorized
access to the data stored in a computer, unapproved access with determined to obligate
commission of further crimes and the illicit alteration of the computer materials.
All of these discussed categories are very much important for the safeguarding the
digital security of the computer system users.
Figure 1: Intention of the Computer Misuse Act
(Source: Created by the author)
The above diagram helps in understanding the main intention of the Computer
Misuse Act. This act can be very much useful to deal with cybersecurity issues such as
hacking. Spreading of malicious programs can be also managed with the help of this act.
Unauthorized
access with a
criminal
intent
Unauthorised o of
the data
Unauthorised
access to data
Digital Security: Principles, Cryptography, Secure Programming Techniques_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assignment on CYBER SECURITY: WannaCry Attack
|12
|2488
|20

Moral and Ethical Frameworks Concepts
|7
|1023
|69

Essay about Cybercrime 2022
|6
|2154
|25

Cyber Crime Trends Research Paper 2022
|10
|3676
|38

Computer Crime and Digital Forensic : Report
|15
|3299
|123

Cyber Security: ABC Technologies
|16
|3805
|242