Professional Documents
Culture Documents
Data Processing, Security, Antivirus
Data Processing, Security, Antivirus
Data in its raw form is useless to any organization. Data processing occurs when data is collected and
translated into usable information.
Data processing starts with data in its raw form and converts it into a more readable format (graphs,
documents, etc.), giving it the form and context necessary to be interpreted by computers and utilized by
employees throughout an organization.
The data processing cycle consists of a series of steps where raw data (input) is fed into a processor (CPU)
to produce actionable insights (output). Each step is taken in a specific order, but the entire process is
repeated in a cyclic manner. The first data processing cycle's output can be stored and fed as the input for
the next cycle.
Generally, there are six main steps in the data processing cycle:
1 Collection
6. Storage 2. Preparation
5. Output 3. Input
4. Processing
Step 1: Collection-The collection of raw data is the first step of the data processing cycle. The type of raw
data collected has a huge impact on the output produced. Hence, raw data should be gathered from defined
and accurate sources so that the subsequent findings are valid and usable. Raw data can include monetary
figures, website cookies, profit/loss statements of a company, user behavior, etc.
Step 2: Preparation-Data preparation or data cleaning is the process of sorting and filtering the raw data to
remove unnecessary and inaccurate data. Raw data is checked for errors, duplication, miscalculations or
missing data, and transformed into a suitable form for further analysis and processing. This is done to ensure
that only the highest quality data is fed into the processing unit.
Step 3: Input-In this step, the raw data is converted into machine readable form and fed into the processing
unit. This can be in the form of data entry through a keyboard, scanner or any other input source.
Step 4: Data Processing-In this step, the raw data is subjected to various data processing methods
using machine learning and artificial intelligence algorithms to generate a desirable output. This step may
vary slightly from process to process depending on the source of data being processed (data lakes, online
databases, connected devices, etc.) and the intended use of the output.
Step 5: Output-The data is finally transmitted and displayed to the user in a readable form like graphs,
tables, vector files, audio, video, documents, etc. This output can be stored and further processed in the next
data processing cycle.
Step 6: Storage-The last step of the data processing cycle is storage, where data and metadata are stored for
further use. This allows for quick access and retrieval of information whenever needed, and also allows it to
be used as input in the next data processing cycle directly.
There are different types of data processing based on the source of data and the steps taken by the
processing unit to generate an output. There is no one-size-fits-all method that can be used for processing
raw data.
Batch Processing
Data is collected and processed in batches. Used for large amount of data e.g payroll system
Real-time Processing
Data is processed within seconds when the input is given. Used for small amount of data e.g withdrawing
money from ATM
Online processing
Data is automatically fed in to the CPU as soon as it becomes available. Used for continuous processing of
data e.g barcode scanning
Multiprocessing
Data is broken down into frames and processed using two or more CPUs with a single computer system.
Also known as parallel processing e.g weather forecasting
Data Processing Methods
There are 3 main methods of data processing: manual, mechanical, and electronic.
Manual Data Processing: In this data processing method, data is processed manually. The entire
process of data collection, filtering, sorting, calculation and other logical operations are all done with human
intervention without the use of any other electronic device or automation software. It is a low-cost method
and requires little to no tools, but produces high errors, high labor costs and lots of time.
Mechanical Data Processing: Data is processed mechanically through the use of devices and machines.
These can include simple devices such as calculators, typewriters, printing press, etc. Simple data
processing operations can be achieved with this method. It has much lesser errors than manual data
processing, but the increase of data has made this method more complex and difficult.
Electronic Data Processing: Data is processed with modern technologies using data processing
software and programs. A set of instructions is given to the software to process the data and yield output.
This method is the most expensive but provides the fastest processing speeds with the highest reliability and
accuracy of output.
A stock trading software that converts millions of stock data into a simple graph
An e-commerce company uses the search history of customers to recommend similar products
A digital marketing company uses demographic data of people to strategize location-specific campaigns
A self-driving car uses real-time data from sensors to detect if there are pedestrians and other cars on the
road
Student’s examination results that has been sorted into pass mark and below pass mark.
Group of patients BP record that has been sorted into below, normal and above normal.
DATA SECURITY
Data security is the practice of protecting digital information from unauthorized access, corruption, or theft
throughout its entire lifecycle.
Data security is a set of standards and technologies that protect data from intentional or accidental destruction,
modification or disclosure.
Data Erasure.
More secure than standard data wiping, data erasure uses software to completely overwrite data on any
storage device. It verifies that the data is unrecoverable.
Data Masking.
By masking data, organizations can allow teams to develop applications or train people using real data. It
masks personally identifiable information (PII) where necessary so that development can occur in
environments that are compliant.
Data Resiliency.
Resiliency is determined by how well an organization endures or recovers from any type of failure – from
hardware problems to power shortages and other events that affect data availability. Speed of recovery is
critical to minimize impact.
Access Controls
This type of data security measures includes limiting both physical and digital access to critical systems
and data. This includes making sure all computers and devices are protected with mandatory login
entry, and that physical spaces can only be entered by authorized personnel.
Authentication
Similar to access controls, authentication refers specifically to accurately identifying users before they
have access to data. This usually includes things like passwords, PIN numbers, security tokens, swipe
cards, or biometrics.
Malware is any software intentionally designed to cause disruption to a computer server, client, or
computer network to leak private information, gain unauthorized access to information or systems,
deprive access to information and ultimately destroys the computer.
‘Malware’ is a short for Malicious Software and are designed by cybercriminal of hackers for its
purposes. Some common malware incudes; Trojan horse, adware, spyware, ransomware, viruses,
worms, Key-loggers, etc.
COMPUTER VIRUSES
A computer virus is a malicious program that self-replicates by coping itself to another program. The
purpose of creating a computer virus is to infect vulnerable systems, gain admin control and steal
sensitive data. Computer viruses are created and designed by hackers with the intents to prey on online
users.
Computer viruses come in different forms to infect the system in different ways. Some of the most
common viruses are;
1. Boot Sector Virus: This type of virus infects the master boot record and it is challenging and
complex task to remove this virus. Most times it requires the system to be formatted. BSV
spread mainly via removable devices.
2. Polymorphic Virus: This a type of virus that is capable of changing itself each time it is copied.
It self-replicates and changes itself, making it difficult for it to be identified and eliminated.
3. Macro Virus: This type of virus is designed to infect specific type of documents file such as MS
word and Excel files. A macro is an action or a set of actions that you can run as many times as
you want. Newer version of Microsoft software has a feature that allows users to deactivate the
use of macros thereby reducing the prevalence of macro viruses.
4. Browser Hijacker Viruses: these are viruses that are capable of hijacking a browser’s history,
settings and codes and re-direct it to a malicious site.
5. File Infector Viruses: This type of virus infect any program for which execution is requested
such as .exe, .css, .sys, etc. Whenever these file are executed, the virus is also activated.
6. Overwrite Viruses: These viruses are predominantly designed to destroy a file or application’s
data. As the name implies, after attacking the computer, it starts to overwrite files with its code
and also starts to spread to nearby files.
It is worthy of note that Viruses and malware are not the same. In everyday conversation in the media, we
often see the terms “virus” and “malware” used interchangeably.
Fortunately, most malicious programs today we hear of aren’t strictly viruses: pure computer viruses
comprise less than 10% of all malware we see.
A computer virus is a type of malware with a distinguishable feature that it needs to infect other files and
programs in order to operate, and it does so by having the ability to copy itself. Viruses can be transmitted
through internal networks, the internet or a USB drive. This makes computer viruses particularly hard to
remove.
Malware on the hand is programming that is intended to disrupt or deny operation, gather information or
gain access to system resources. Malware encompasses all types of malicious software and besides
computer viruses, there are worms, Trojans, ransomware, spyware, and many others. Because of this, many
anti-virus programs do not have the ability to detect and remove all malware.
ANTIVIRUSES
Antiviruses are software that protects the computer from virus attacks. They are installed in the computer as
a software and permission is granted for them to run promptly.
As cybercrime evolves and becomes more sophisticated, whether it’s your own PC or other devices on a larger
network, you don’t want to leave yourself or your network vulnerable. If you don’t have security software,
you could be opening the door for cybercriminals to gain access to your most sensitive information — and
potentially garner control over your computer and mobile devices.
What are the different types of antivirus protection?
Several types of antivirus programs have evolved over the years. When setting up your umbrella of protection,
it’s important to understand the more common antivirus programs available.