Professional Documents
Culture Documents
Issues Related To The Integrity of Files
Issues Related To The Integrity of Files
Issues Related To The Integrity of Files
Data integrity is a critical aspect to the design, implementation and usage of any system
which stores, processes, or retrieves data. There are a number of ways in which data
may be compromised:
inaccurate data entry;
computer virus;
hardware malfunctions;
deleting or changing data by accident or maliciously;
natural disaster such as fire flood, volcanic eruptions or earthquake.
RESTRICTED ACCESS
Organizations take several measures to help prevent unauthorized access and use of
computer files. An access control is a security measure that defines who can access a
computer when they can access it and what actions they can take while accessing the
computer.
Many systems implement access controls using a two-phase process called identification
and authentication.
Identification verifies that an individual is a valid user.
Authentication verifies that the individual is the person he or she claims to be.
Three methods of identification and authentication include:
user names and passwords.
possessed objects
biometric devices
Possessed Objects
A possessed object is any item that will allow access to a computer or computer facility.
OVERWRITE PROTECTION
A user may write protect a file to ensure that changes are not made to a file and the
files are read-only. With the read-only access, a person on a network is only permitted
to view the files.
To write-protect a document:
Open My Documents;
Right-click on the file to be write-protected.
Select Properties from the pop-up menu that appears on screen.
Click on Read-only option in the Attributes section of the Properties dialog box. (A
check mark appears in the box)
Click Apply.
Click OK
DATA ENCRYPTION
Encryption is the process of converting (scrambling) readable data into characters that
cannot be understood to prevent unauthorized access.
Files are encrypted using a key provided by the person who wants to encrypt the
data. In order to read encrypted information, it must first be decrypted. This is the
process of decoding the information in order to obtain the original information.
VIRUS PROTECTION
There are a number of ways in which a computer may acquire a virus. These include:
an e-mail attachment
downloads from internet websites that do not have antivirus protection
floppy disks or flash drives used on infected computers
In addition to viruses, other malicious-logic programs such as Worm and Trojan Horse
exist.
Worm – a worm copies itself repeatedly in memory or over a network, using up system
resources and may shut down the system.
Trojan Horse – a trojan horse hides within or looks like a legitimate program such as a
screen saver. Unlike a virus or worm, a Trojan horse does not replicate itself to other
computers.
To protect a computer from virus attackers, users should install an antivirus program
and update it frequently. An antivirus program protects a computer against viruses by
identifying and removing any computer viruses found in memory on storage media or
on incoming files.