KEMBAR78
Data Integrity and Security | PDF | Computer File | Computer Network
100% found this document useful (1 vote)
256 views4 pages

Data Integrity and Security

Data integrity and security are important topics as our information is stored everywhere digitally. There are chances of information being compromised if not properly protected. [1] Various types of data stored on networks, devices, and cloud are at risk. [2] Accidental acts like hardware failure or natural disasters as well as deliberate acts like hacking can damage, loss, or breach integrity of data. [3] Hardware and software restrictions like passwords, encryption, firewalls, and anti-virus software can be used to secure data and ensure its integrity is maintained.

Uploaded by

Varsha Ghanash
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
256 views4 pages

Data Integrity and Security

Data integrity and security are important topics as our information is stored everywhere digitally. There are chances of information being compromised if not properly protected. [1] Various types of data stored on networks, devices, and cloud are at risk. [2] Accidental acts like hardware failure or natural disasters as well as deliberate acts like hacking can damage, loss, or breach integrity of data. [3] Hardware and software restrictions like passwords, encryption, firewalls, and anti-virus software can be used to secure data and ensure its integrity is maintained.

Uploaded by

Varsha Ghanash
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Data Integrity and security

After reading this topic student will be able to:


1. Understand the terms Data integrity and Data security.
2. What type of data could be at risk?
3. Common vulnerabilities and threats to data.
4. Identify different methods to protect data and information stored on cloud and
on computer.
5. Identify when to use hardware and software methods to secure data.
6. How Information can be misused?

Our information is stored everywhere in this digital era. There are chances our
information stored is compromised. We must take all measures to protect our
information stored on cloud and on the equipment (devices) by using hardware and
software safeguards.

What kind of data could be at risk?


Data being captured.
Data collected and awaiting processing
Data being processed
Data stored on removable media
Data stored on networks
Data being transmitted over a communication network.
Common vulnerabilities and threats to data:
Data may become damaged, or lost, stolen or have its integrity breached through
accidental or deliberate acts.

Accidental Deliberate
Accidents Hacking
Hardware failure Malware
Power related problems Fraud and theft
Natural Disasters Revenge
Fire
Environmental factors

The area of integrity and security is becoming more important to reduce the levels of
computer crimes
Data Integrity: Data Security:
Concerns with accuracy, reliability and Ensuring data does not loses its
consistency of data. integrity by using appropriate
hardware and software restrictions.

Hardware Restrictions:
Biometric systems: a system that measures one or more of your physical attributes,
such as fingerprints, face and iris patterns, in order to check your identity.
Application: at airport, travelers custom clearance.
Security personnel: allows only authorized persons in an organization or building
by checking their identification card.
Application: Organization use night security guards to patrol the buildings and
deter criminals.
Electronic keycards: A card with the magnetic strip given only to authorized
persons to enter the premises.
Application: Banks, Hotel room access
Equipment lock: Locking the computer system and the peripheral equipment in
place.
Application: Schools, Libraries.
Fireproof Cabinets: Keeping storage media in a fireproof cabinet.
Application: Use of fireproof cabinets in case of natural disasters to store
important devices, files and computer equipment.

Software restrictions
Passwords for the system: A password is used to control access on the computer.
Passwords for individual files and folders: Using password on individual files and
folders protects the sensitive information from unauthorized persons in an
organization.
Audit trails or access logs: Security software program used to track users activity
(such as who is accessing what data, when and how often) on a network.
Encryption: This is encoding (scrambling) data during storage or transmission so
that it cannot be understood by someone who does not have the encryption key to
convert the document back to its original form.
Firewall: A program that filters the information coming into your computer
system through network’s connection to the internet.
Anti-virus software: a special type of software used to remove or inactivate known
viruses from a computer’s hard disk.
Misuse of Information:
Credit card fraud Credit card fraud happens when criminals illegally use someone else’s credit card
details to obtain goods and services.
Identity Theft Is when criminals obtain and use someone else’s personal details to impersonate
them.
Violation of privacy Privacy refers to an individual’s right to restrict or eliminate the collection, use,
and sale of confidential personal information.
Examples of violation of privacy: Pictures or videos taken/recorded in classroom
of instructors without permission.
Social media user’s 2-year old daughter’s picture was downloaded and used for
advertising reasons.
Storage of inaccurate Storage of inaccurate personal data can have a serious impact on an individual.
information Individual’s incorrect medical history.
Individual’s incorrect banking information.
To counteract this type of crime, countries have introduced Data protection law,
that allows individuals to see and correct the information held about them on their
computer systems.
Surveillance Is a fraud that involves electronically observing a user’s activity on the computer.
Criminals use a keylogging software that records every key pressed on the
computer. Using this technique criminals are able to steal usernames, passwords,
bank and credit card details.
Computer fraud Use of computers to illegally obtain money, goods or services.
Electronic eavesdropping Is illegally intercepting electronic messages as they are being transmitted over a
computer network.
Industrial espionage Is when confidential information from within companies and other commercial
organizations is obtained by spying in an effort to gain some advantage.
Propaganda Is a form of communication aimed at influencing the attitude of a community
towards some cause or position.
Software piracy Unauthorized copying or distribution of copyrighted software.
Spyware A software which is secretly installed on a computer and covertly monitors the
users actions without his/her actions.
The information gathered is then transmitted to someone else.

You might also like