This document defines and explains key data security terms: a virus copies itself and can corrupt systems or destroy data; data integrity ensures data accuracy over its life; data encryption translates data into a secret format for authorized access only; a firewall prevents unauthorized network access; and data privacy concerns proper data handling, consent, and regulations. It also lists ways data integrity can be compromised, such as hardware failure, hackers, malware, disasters, and human error, as well as physical safeguards like access controls and software safeguards like user authentication and system protections.
This document defines and explains key data security terms: a virus copies itself and can corrupt systems or destroy data; data integrity ensures data accuracy over its life; data encryption translates data into a secret format for authorized access only; a firewall prevents unauthorized network access; and data privacy concerns proper data handling, consent, and regulations. It also lists ways data integrity can be compromised, such as hardware failure, hackers, malware, disasters, and human error, as well as physical safeguards like access controls and software safeguards like user authentication and system protections.
This document defines and explains key data security terms: a virus copies itself and can corrupt systems or destroy data; data integrity ensures data accuracy over its life; data encryption translates data into a secret format for authorized access only; a firewall prevents unauthorized network access; and data privacy concerns proper data handling, consent, and regulations. It also lists ways data integrity can be compromised, such as hardware failure, hackers, malware, disasters, and human error, as well as physical safeguards like access controls and software safeguards like user authentication and system protections.
Explain the following terms: virus, data integrity, data
encryption, firewall, data privacy.
Virus is a piece of code which is capable of copying itself and typically has a detrimental effect, such as corrupting the system or destroying data. Data integrity is the maintenance of, and the assurance of, data accuracy and consistency over its entire life-cycle. Data encryption is the process of translating data into a secret format so that only authorized parties can understand the information. Firewall is a network security device designed to prevent unauthorized access to or from a private network. Data privacy is a branch of data security concerned with the proper handling of data – consent, notice, and regulatory obligations. List three ways in which data integrity can be compromised. 1. Hard drive failure. 2. Unauthorized users/Hackers 3. Malware, software and bugs 4. Disasters, such as fires and floods 5. Human error. List three forms of physical safe guards and three forms of software safe guards Physical Safe guards Facility Access Controls Workstation Use Device and media controls Workstation security
Software Safe guards
User authentication Systems protections Safe hardware disposal