Data Integrity and Security
Data Integrity and Security
Our information is stored everywhere in this digital era. There are chances our
information stored is compromised. We must take all measures to protect our
information stored on cloud and on the equipment (devices) by using hardware and
software safeguards.
Accidental Deliberate
Accidents Hacking
Hardware failure Malware
Power related problems Fraud and theft
Natural Disasters Revenge
Fire
Environmental factors
The area of integrity and security is becoming more important to reduce the levels of
computer crimes
Data Integrity: Data Security:
Concerns with accuracy, reliability and Ensuring data does not loses its
consistency of data. integrity by using appropriate
hardware and software restrictions.
Hardware Restrictions:
Biometric systems: a system that measures one or more of your physical attributes,
such as fingerprints, face and iris patterns, in order to check your identity.
Application: at airport, travelers custom clearance.
Security personnel: allows only authorized persons in an organization or building
by checking their identification card.
Application: Organization use night security guards to patrol the buildings and
deter criminals.
Electronic keycards: A card with the magnetic strip given only to authorized
persons to enter the premises.
Application: Banks, Hotel room access
Equipment lock: Locking the computer system and the peripheral equipment in
place.
Application: Schools, Libraries.
Fireproof Cabinets: Keeping storage media in a fireproof cabinet.
Application: Use of fireproof cabinets in case of natural disasters to store
important devices, files and computer equipment.
Software restrictions
Passwords for the system: A password is used to control access on the computer.
Passwords for individual files and folders: Using password on individual files and
folders protects the sensitive information from unauthorized persons in an
organization.
Audit trails or access logs: Security software program used to track users activity
(such as who is accessing what data, when and how often) on a network.
Encryption: This is encoding (scrambling) data during storage or transmission so
that it cannot be understood by someone who does not have the encryption key to
convert the document back to its original form.
Firewall: A program that filters the information coming into your computer
system through network’s connection to the internet.
Anti-virus software: a special type of software used to remove or inactivate known
viruses from a computer’s hard disk.
Misuse of Information:
Credit card fraud Credit card fraud happens when criminals illegally use someone else’s credit card
details to obtain goods and services.
Identity Theft Is when criminals obtain and use someone else’s personal details to impersonate
them.
Violation of privacy Privacy refers to an individual’s right to restrict or eliminate the collection, use,
and sale of confidential personal information.
Examples of violation of privacy: Pictures or videos taken/recorded in classroom
of instructors without permission.
Social media user’s 2-year old daughter’s picture was downloaded and used for
advertising reasons.
Storage of inaccurate Storage of inaccurate personal data can have a serious impact on an individual.
information Individual’s incorrect medical history.
Individual’s incorrect banking information.
To counteract this type of crime, countries have introduced Data protection law,
that allows individuals to see and correct the information held about them on their
computer systems.
Surveillance Is a fraud that involves electronically observing a user’s activity on the computer.
Criminals use a keylogging software that records every key pressed on the
computer. Using this technique criminals are able to steal usernames, passwords,
bank and credit card details.
Computer fraud Use of computers to illegally obtain money, goods or services.
Electronic eavesdropping Is illegally intercepting electronic messages as they are being transmitted over a
computer network.
Industrial espionage Is when confidential information from within companies and other commercial
organizations is obtained by spying in an effort to gain some advantage.
Propaganda Is a form of communication aimed at influencing the attitude of a community
towards some cause or position.
Software piracy Unauthorized copying or distribution of copyrighted software.
Spyware A software which is secretly installed on a computer and covertly monitors the
users actions without his/her actions.
The information gathered is then transmitted to someone else.