Professional Documents
Culture Documents
MODULE 4d - DATA SECURITY-revised
MODULE 4d - DATA SECURITY-revised
Data security
Data security is the protection of data against intentional or accidental damage. Organizations
spend considerable time and money in making sure that their information systems are secure
against various hazards, natural and man-made. Organizations use both software and physical
means to protect their data.
Computer Security, techniques are developed to protect single computers and network-linked
computer systems from accidental or intentional harm, including destruction of computer
hardware and software, physical loss of data, deception of computer users and the deliberate
invasion of databases by unauthorized individuals. Computer systems are protected by using
Software Access Restriction as well as Physical Access Restriction
A variety of simple techniques can prevent computer crime. For example, destroying printed
information, protecting computer screens from observation, keeping printed information and
computers in locked cabinets, and clearing desktops of sensitive documents prevent access to
confidential information. But more sophisticated methods are also necessary to prevent computer
crimes.
There are various ways in which data can be secured; some of these are discussed below:
1. The first measure of security normally used is the protection of the physical surroundings,
that is, the buildings and rooms with the computers in them. Common approaches
include:
a. Security cameras PHYSICAL
b. Electronic alarm systems ACCESS
c. Biometric systems, such as fingerprints, retina and voice scans RESTRICTION
d. Access codes/passwords
e. Computer-controlled locks that check employee badges
f. Guards and locks
g. Fire/water proof cabinets
2. The computers may be locked to the desks to prevent theft of the system itself or
peripheral devices, however some organizations still experience theft of memory chips,
hard drives, CD and DVD drives, inks and other accessories.
3. Some organizations use fireproof cabinets and safes to keep critical data that is stored on
media such as CDs, magnetic tape protected.
An uninterruptible power supply (UPS) may also be used to minimize the effect of power
outages. The UPS contains a battery which supplies equipment with electricity during a
power outage so that data can be backed up and a normal shut down of the system can be
performed.
4. Only authorized persons should have access to the computer systems of an organization.
Each user is provided with a username and password with which they log in and use
network resources.
6. Anti-viruses should be installed on all computer systems to protect them against viruses.
A computer virus is a program that infects computer files and makes them do something
unexpected or damaging. Viruses may be transmitted by e-mail but viruses can also be
spread by downloading programs or files from the internet or by using files on a CD or
flash drive that have been infected.
7. It is important to make back-up (copies) of files as they can become damaged, corrupted
or lost. Backups can be performed after each work day, every other day or as often as
necessary.
Files that are no longer needed on a regular basis may be archived. For example
organizations may preserve past receipts and tax forms for future reference only.
Archived data is normally stored on a CD or magnetic tape.
Data integrity
Data integrity is achieved when all the data is accurate and up to date. Data integrity identifies
the quality of the data. Users will not rely on data that has little or no integrity, therefore data
integrity is very important because computers and people use information to make decisions
and take action.
There are various ways in which data can be secured; some of these are discussed below:
The first measure of security normally used is the protection of the physical surroundings, that is,
the buildings and rooms with the computers in them.
Biometric systems/recognition
This authenticates a person’s identity by translating a personal characteristic, such as a
fingerprint, into a digital code that is then compared with a digital code stored in the computer.
If these codes do not match then the computer denies access to the individual. Examples of
biometric system include, hand geometric system, face recognition system, voice recognition
system, iris recognition system.
Computer hardware is easily stolen and one way of protecting them, is to use the slots on the
computers that allows you to attach a lock that is chained to a desk. Windows and doors of a
computer room can be padlocked to prevent unauthorised access thereby preventing theft of
computer equipment. Physical data can also be locked away in a safe or lock draw to prevent
them from being stolen or viewed by unauthorised persons.
Locks:- Devices such as cables that lock the computer to a desk, cabinet, or floor are sometimes
used. Small locking devices also exist that require a key to access a hard disk, CD or DVD
drive, or floppy disk drive.
Passwords
Passwords are confidential sequences of characters that give approved users access to
computers. To be effective, passwords must be difficult to guess. Effective passwords contain a
mixture of characters and symbols that are not real words. To thwart imposters, computer
systems usually limit the number of attempts to enter a correct password.
Encryption
This is a method of disguising the contents of a file so that it cannot be understood. Data is
encrypted when it is converted into a secret code. Encrypted data is decrypted when it is
converted back into ordinary text.
Information can be scrambled and unscrambled using mathematical equations and a secret
code called a key. Two keys are usually employed, one to encode and the other to decode the
information.
Virus Protection
This is the use of antivirus software that protects the operating system, programs and files
against viruses. Anti-virus software can be set up to automatically check diskettes, internet
downloads and e-mails for any viruses.
Firewalls
This is a software that defends the weak points in a computer network, to prevent hackers from
gaining entry. A firewall checks all the data communications, that come into and go out of the
computers network. It will block any communication that does not match its rules. The rules can
be set to give the level of protection that is needed for the network.
It ensures that information received from an outside source does not contain computer viruses,
self-replicating computer programs that interfere with a computer's functions.
Backup and recovery
A backup is a duplicate of a file, program or disk that can be used if the original is lost, damaged,
or destroyed. Thus to backup a file means to make a copy of in case of a system failure or the
discovery of corrupt files. You restore the files by copying the backed up files to their original
location on the computer. Data should be backed up regularly and organizations should always
have a disaster recovery strategy that covers:
a. Replacing hardware as soon as possible
b. Recovering data from backup
Disaster recovery strategy is a means of getting back to normal as soon as possible if disaster
strikes.
Data security refers to protective digital privacy measures that are applied to prevent
unauthorized access to computers, databases and websites. Data security also protects data from
corruption.
DATA SECURITY - This covers all the methods that can be used to keep data safe and
accurate.
DATA INTEGRITY - Data integrity is a achieved when all the data is accurate and up to date.
Data integrity identifies the quality of the data. Users will not rely on data that has little or no
integrity, therefore data integrity is very important because computers and people use
information to make decisions and take action.
Computers hold vast amount of information, all of which has to be kept safe and accurate. Data
that is not accurate is not useful.
Data can be inaccurate for a number of reasons and can happen accidentally or deliberately from
external or internal sources.
EXTERNAL SOURCES
ACCIDENTAL
a. HACKERS Computer users attempt to access data files and records using
communication networks to plant viruses, access sensitive files, divert electronic
financial transactions for personal gain
c. THEFT OF HARDWARE
d. THEFT OF SOFTWARE
INTERNAL SOURCES
ACCIDENTAL
DELIBERATE
a. Disgruntled employees with a grudge against the company could attempt to damage
critical data using their knowledge of system operations
b. An employee may try to fraudulently obtain money using the company’s name.
Data therefore can be inaccurate or missing because of mistakes made by people, accidental
damage to the system or as a result of criminal activities. Compromised data can also be
misused.
https://www.dummies.com/education/internet-basics/6-common-ways-your-information-can-be-
compromised/
https://www.edrm.net/glossary/data-integrity/