260 likes | 608 Views
Data Integrity and Security. Data integrity. data that has a complete or whole structure a condition in which data has not been altered or destroyed in an unauthorized manner. Wiretapping. any interception of a telephone transmission by accessing the telephone signal itself.
E N D
Data integrity • data that has a complete or whole structure • a condition in which data has not been altered or destroyed in an unauthorized manner
Wiretapping • any interception of a telephone transmission by accessing the telephone signal itself
Electronic eavesdropping • the use of an electronic transmitting or recording device to monitor conversations without the consent of the parties
Who can legally monitor phone conversations? • Federal law enforcement officials may tap telephone lines only after showing "probable cause" of unlawful activity and obtaining a court order • must limit the surveillance to communications related to the unlawful activity and to a specific period of time, usually 30 days • Electronic Communications Privacy Act, 18 USC 2516
How does a cordless phone communicate? • Cordless phones operate like mini-radio stations. • They send radio signals from the base unit to the handset and from the handset back to the base. • These signals can travel as far as a mile from the phone's location
CELLULAR TELEPHONES • Cellular phones send radio signals to low-power transmitters located within "cells" that range from one block to 20 miles across • As you travel from cell to cell, the signal carrying your voice is transferred to the nearest transmitter
Data encryption • the coding (scrambling), of the data before it is transmitted over the communication link • Decryption is the decoding (descrambling), of the received data.
Algorithm • An algorithm is a set of instructions, in this case for scrambling the data • A key is a set of specific codes to be used by the algorithm to perform the encryption
Protect yourself in data communications • Keep your system software and patches up to date • A personal firewall • Keep your anti-virus software up to date • Turn off any services you don't need • Least secure: Wireless networking