Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

MODULE 4 2018 OCT 23

Data Integrity & Data Security


Application and Implications of Information and Communication Technologies

Data security
Data security is the protection of data against intentional or accidental damage. Organizations
spend considerable time and money in making sure that their information systems are secure
against various hazards, natural and man-made. Organizations use both software and physical
means to protect their data.

Computer Security, techniques are developed to protect single computers and network-linked
computer systems from accidental or intentional harm, including destruction of computer
hardware and software, physical loss of data, deception of computer users and the deliberate
invasion of databases by unauthorized individuals. Computer systems are protected by using
Software Access Restriction as well as Physical Access Restriction

A variety of simple techniques can prevent computer crime. For example, destroying printed
information, protecting computer screens from observation, keeping printed information and
computers in locked cabinets, and clearing desktops of sensitive documents prevent access to
confidential information. But more sophisticated methods are also necessary to prevent computer
crimes.

There are various ways in which data can be secured; some of these are discussed below:

1. The first measure of security normally used is the protection of the physical surroundings,
that is, the buildings and rooms with the computers in them. Common approaches
include:
a. Security cameras PHYSICAL
b. Electronic alarm systems ACCESS
c. Biometric systems, such as fingerprints, retina and voice scans RESTRICTION
d. Access codes/passwords
e. Computer-controlled locks that check employee badges
f. Guards and locks
g. Fire/water proof cabinets

2. The computers may be locked to the desks to prevent theft of the system itself or
peripheral devices, however some organizations still experience theft of memory chips,
hard drives, CD and DVD drives, inks and other accessories.

3. Some organizations use fireproof cabinets and safes to keep critical data that is stored on
media such as CDs, magnetic tape protected.

ST JAGO HIGH SCHOOL 1 of 8


BUSINESS EDUCATION/INFORMATION TECHNOLOGY DEPT
MODULE 4 2018 OCT 23

An uninterruptible power supply (UPS) may also be used to minimize the effect of power
outages. The UPS contains a battery which supplies equipment with electricity during a
power outage so that data can be backed up and a normal shut down of the system can be
performed.

4. Only authorized persons should have access to the computer systems of an organization.
Each user is provided with a username and password with which they log in and use
network resources.

5. Network access logs should be maintained by network administrators to observe the


resources being used at any time by users and the time of their logging in and logging out
as to avoid hacking. Hacking is the unauthorized access and use of computer systems to
steal or damage data and programs.

6. Anti-viruses should be installed on all computer systems to protect them against viruses.
A computer virus is a program that infects computer files and makes them do something
unexpected or damaging. Viruses may be transmitted by e-mail but viruses can also be
spread by downloading programs or files from the internet or by using files on a CD or
flash drive that have been infected.

7. It is important to make back-up (copies) of files as they can become damaged, corrupted
or lost. Backups can be performed after each work day, every other day or as often as
necessary.

Files that are no longer needed on a regular basis may be archived. For example
organizations may preserve past receipts and tax forms for future reference only.
Archived data is normally stored on a CD or magnetic tape.

Data integrity
Data integrity is achieved when all the data is accurate and up to date. Data integrity identifies
the quality of the data. Users will not rely on data that has little or no integrity, therefore data
integrity is very important because computers and people use information to make decisions
and take action.

There are various ways in which data can be secured; some of these are discussed below:

ST JAGO HIGH SCHOOL 2 of 8


BUSINESS EDUCATION/INFORMATION TECHNOLOGY DEPT
MODULE 4 2018 OCT 23

PHYSICAL ACCESS RESTRICTION

The first measure of security normally used is the protection of the physical surroundings, that is,
the buildings and rooms with the computers in them.

Biometric systems/recognition
This authenticates a person’s identity by translating a personal characteristic, such as a
fingerprint, into a digital code that is then compared with a digital code stored in the computer.
If these codes do not match then the computer denies access to the individual. Examples of
biometric system include, hand geometric system, face recognition system, voice recognition
system, iris recognition system.

Guards and locks


A business may employee security guards to prevent unauthorised access to computer rooms,
equipment and files.

Computer hardware is easily stolen and one way of protecting them, is to use the slots on the
computers that allows you to attach a lock that is chained to a desk. Windows and doors of a
computer room can be padlocked to prevent unauthorised access thereby preventing theft of
computer equipment. Physical data can also be locked away in a safe or lock draw to prevent
them from being stolen or viewed by unauthorised persons.

Guards:- Guards can be placed at strategic points in the computer centre

Locks:- Devices such as cables that lock the computer to a desk, cabinet, or floor are sometimes
used. Small locking devices also exist that require a key to access a hard disk, CD or DVD
drive, or floppy disk drive.

Fire and Water Proof Cabinet


A fireproof cabinet is a cupboard or storage area that does not get burnt by fire or damaged by
heat. A waterproof cabinet protects its content from being damaged by water.

ST JAGO HIGH SCHOOL 3 of 8


BUSINESS EDUCATION/INFORMATION TECHNOLOGY DEPT
MODULE 4 2018 OCT 23

SOFTWARE ACCESS RESTRICTION

Passwords
Passwords are confidential sequences of characters that give approved users access to
computers. To be effective, passwords must be difficult to guess. Effective passwords contain a
mixture of characters and symbols that are not real words. To thwart imposters, computer
systems usually limit the number of attempts to enter a correct password.
Encryption
This is a method of disguising the contents of a file so that it cannot be understood. Data is
encrypted when it is converted into a secret code. Encrypted data is decrypted when it is
converted back into ordinary text.
Information can be scrambled and unscrambled using mathematical equations and a secret
code called a key. Two keys are usually employed, one to encode and the other to decode the
information.
Virus Protection
This is the use of antivirus software that protects the operating system, programs and files
against viruses. Anti-virus software can be set up to automatically check diskettes, internet
downloads and e-mails for any viruses.

Firewalls
This is a software that defends the weak points in a computer network, to prevent hackers from
gaining entry. A firewall checks all the data communications, that come into and go out of the
computers network. It will block any communication that does not match its rules. The rules can
be set to give the level of protection that is needed for the network.
It ensures that information received from an outside source does not contain computer viruses,
self-replicating computer programs that interfere with a computer's functions.
Backup and recovery
A backup is a duplicate of a file, program or disk that can be used if the original is lost, damaged,
or destroyed. Thus to backup a file means to make a copy of in case of a system failure or the
discovery of corrupt files. You restore the files by copying the backed up files to their original
location on the computer. Data should be backed up regularly and organizations should always
have a disaster recovery strategy that covers:
a. Replacing hardware as soon as possible
b. Recovering data from backup

Disaster recovery strategy is a means of getting back to normal as soon as possible if disaster
strikes.

ST JAGO HIGH SCHOOL 4 of 8


BUSINESS EDUCATION/INFORMATION TECHNOLOGY DEPT
MODULE 4 2018 OCT 23

Proprietary data and software


Proprietary data is data owned and controlled exclusively by a company. If a company is
working on highly sensitive information they may decide to have the software written for them
instead of using off the shelf software. This will give them the opportunity to build additional
security into the program.

ST JAGO HIGH SCHOOL 5 of 8


BUSINESS EDUCATION/INFORMATION TECHNOLOGY DEPT
MODULE 4 2018 OCT 23

How can data be compromised?


Data is compromised when it has lost either its security or its integrity.

Data security refers to protective digital privacy measures that are applied to prevent
unauthorized access to computers, databases and websites. Data security also protects data from
corruption.

DATA SECURITY - This covers all the methods that can be used to keep data safe and
accurate.

DATA INTEGRITY - Data integrity is a achieved when all the data is accurate and up to date.
Data integrity identifies the quality of the data. Users will not rely on data that has little or no
integrity, therefore data integrity is very important because computers and people use
information to make decisions and take action.

Computers hold vast amount of information, all of which has to be kept safe and accurate. Data
that is not accurate is not useful.

Data can be inaccurate for a number of reasons and can happen accidentally or deliberately from
external or internal sources.

EXTERNAL SOURCES
ACCIDENTAL

a. NATURAL DISASTERS such as floods and other natural phenomenon (hurricane


earthquakes and volcanoes.
b. ELECTRICAL POWER SURGES AND SPIKES changes in electrical power can
cause damages to computer hardware, software and stored data files.
DELIBERATE

a. HACKERS Computer users attempt to access data files and records using
communication networks to plant viruses, access sensitive files, divert electronic
financial transactions for personal gain

b. INDUSTRIAL ESPIONAUGE This is where competing organizations access


confidential company information for a competitive advantage.

c. THEFT OF HARDWARE

d. THEFT OF SOFTWARE

e. TERRORIST ACTIVITIES e.g. 1) Bombings and arsons

ST JAGO HIGH SCHOOL 6 of 8


BUSINESS EDUCATION/INFORMATION TECHNOLOGY DEPT
MODULE 4 2018 OCT 23

INTERNAL SOURCES
ACCIDENTAL

a. Clerical errors- errors in data entry


b. Files accidentally erased or corrupted
c. Internally produced software maybe flawed and as a result damage data.
d. Email attachments containing viruses maybe open and spread throughout the
computer network and damage data.

DELIBERATE

a. Disgruntled employees with a grudge against the company could attempt to damage
critical data using their knowledge of system operations
b. An employee may try to fraudulently obtain money using the company’s name.

Data therefore can be inaccurate or missing because of mistakes made by people, accidental
damage to the system or as a result of criminal activities. Compromised data can also be
misused.

ST JAGO HIGH SCHOOL 7 of 8


BUSINESS EDUCATION/INFORMATION TECHNOLOGY DEPT
MODULE 4 2018 OCT 23

References & Resources

https://www.dummies.com/education/internet-basics/6-common-ways-your-information-can-be-
compromised/

https://www.edrm.net/glossary/data-integrity/

ST JAGO HIGH SCHOOL 8 of 8


BUSINESS EDUCATION/INFORMATION TECHNOLOGY DEPT

You might also like