11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

data structures 137ture <strong>and</strong> terminology, but also provide for varying userstatus <strong>and</strong> access to objects.Record-level SecuritySecurity on the basis <strong>of</strong> whole directories or even files maybe too “coarse” for many applications. In a particular databasefile, different users may be given access to differentdata fields. For example, a clerk may have read-only accessto an employee’s basic identification information, but notto the results <strong>of</strong> performance evaluations. An administratormay have both read <strong>and</strong> write access to the latter. Usingsome combination <strong>of</strong> database management <strong>and</strong> operatingsystem level capabilities, the system will maintain lists <strong>of</strong>user accounts together with the objects (such as recordtypes or fields) they can access, <strong>and</strong> the types <strong>of</strong> access(read only or read/write) that are permitted. Rather thanassigning access capabilities separately for each user, theymay be defined for a group <strong>of</strong> similar users, <strong>and</strong> then individualusers can be assigned to the group.Other Security MeasuresSecurity is also important at the program level. Because abadly written (or malicious) program might destroy importantdata or system files, most modern operating systemsrestrict programs in a number <strong>of</strong> ways. Generally, each programis allowed to access only such memory as it allocatesitself, <strong>and</strong> is not able to change data in memory belongingto other running programs. Access to hardware devices canalso be restricted: an operating system component may havethe ability to access the innermost core <strong>of</strong> the operating system(where drivers interact directly with devices), whilean ordinary applications program may be able to accessdevices only through facilities provided by the operatingsystem.There are a number <strong>of</strong> techniques that unauthorizedintruders can use to try to compromise operating systems(see computer crime <strong>and</strong> security). Access capabilitiesthat are tied to user status are vulnerable if the user can getthe login ID <strong>and</strong> password for the account. If the accounthas a high (administrator or root) status, then the intrudermay be able to give viruses, Trojan horses, or other maliciousprograms the status they need in order to be able topenetrate the defenses <strong>of</strong> the operating system (see alsocomputer virus).Files that have intrinsically sensitive or valuable dataare <strong>of</strong>ten further protected by encoding them (see encryption).Encryption means that even intruders who gain readaccess to the file will need either to crack the encryption(very difficult without considerable time <strong>and</strong> computerresources) or somehow obtain the key. Encryption does notprevent the deletion or copying <strong>of</strong> a file, however, just theunderst<strong>and</strong>ing <strong>of</strong> its contents.The dispersal <strong>of</strong> valuable or sensitive data (such as customers’social security numbers) across exp<strong>and</strong>ing networksincreases the risk <strong>of</strong> “data breaches” where the privacy,financial security, <strong>and</strong> even identity <strong>of</strong> thous<strong>and</strong>s <strong>of</strong> peopleare compromised (see also identity theft). In recentyears, for example, there have been numerous cases wherelaptop computers containing thous<strong>and</strong>s <strong>of</strong> sensitive recordshave been stolen from universities, financial institutions,or government agencies—in such cases there is <strong>of</strong>ten noway to know whether the thief will actually access the data.(Often affected individuals are notified that they may beat risk, <strong>and</strong> such prophylactic measures as credit monitoringare provided.) In response to public anxiety there hasbeen pressure for federal or state legislation that wouldmake companies responsible for breaches <strong>of</strong> their data <strong>and</strong>specify compensation or other recourse for affected customers.(Opponents <strong>of</strong> such laws cite government reports thatfind that most data breaches do not lead to identity theft,<strong>and</strong> that the regulations would increase the cost <strong>of</strong> millions<strong>of</strong> daily transactions.)There is a continuing trade<strong>of</strong>f between security <strong>and</strong> ease<strong>of</strong> use. From the security st<strong>and</strong>point, it might be assumedthat the more barriers or checkpoints that can be set upfor verifying authorization, the safer the system will be.However, as security systems become more complex, itbecomes more difficult to ensure that authorized users arenot unduly inconvenienced. If users are sufficiently frustrated,they will be tempted to try to bypass security, suchas by sharing IDs <strong>and</strong> passwords or making files they create“public.”Further ReadingGarretson, Cara. “The Do’s <strong>and</strong> Don’ts <strong>of</strong> Data Breaches: HowSecurity Pr<strong>of</strong>essionals Can Lessen the Impact.” NetworkWorld, June 18, 2007, p. 1.Grant, Gross. “Gov’t Report: Data Breaches Don’t Often Result inID Theft.” PC World, July 6, 2007, n.p. Available online. URL:http://www.pcworld.com/article/id,134203-c,privacysecurity/article.html. Accessed July 8, 2007.Killmeyer, Jan. Information Security Architecture: An IntegratedApproach to Security in the Organization. 2nd ed. Boca Raton,Fla.: Auerbach Publications, 2006.Rasch, Max. “Strict Liability for Data Breaches?” Availableonline. URL: http://www.securityfocus.com/columnists/387.Accessed July 8, 2007.Tipton, Harold F., <strong>and</strong> Micki Krause. Information Security ManagementH<strong>and</strong>book. 6th ed. Boca Raton, Fla.: Auerbach Publications,2007.data structuresA data structure is a way <strong>of</strong> organizing data for use in acomputer program. There are three basic components to adata structure: a set <strong>of</strong> suitable basic data types, a way toorganize or relate these data items to one another, <strong>and</strong> a set<strong>of</strong> operations, or ways to manipulate the data.For example, the array is a data structure that canconsist <strong>of</strong> just about any <strong>of</strong> the basic data types, althoughall data must be <strong>of</strong> the same type. The way the data is organizedis by storing it in sequentially addressable locations.The operations include storing a data item (element) in thearray <strong>and</strong> retrieving a data item from the array.Types <strong>of</strong> Data StructuresThe data structures commonly used in computer scienceinclude arrays (as discussed above) <strong>and</strong> various types <strong>of</strong>lists. The primary difference between an array <strong>and</strong> a list isthat an array has no internal links between its elements,

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!