Download as pdf or txt
Download as pdf or txt
You are on page 1of 8

File Integrity and Data

Security
Form 4 EDPM
Objectives
● Explain issues related to the integrity of files
● Discuss issues related to the security of files
● Examine issues related to the retention of files
● Explain methods for tracing document versions
An accountant creates an electronic spreadsheet containing
the credit card details of 500 customers and saves this file on
the desktop of his computer. He leaves his desk for a few
hours to attend to company business. In his absence, an
accounting clerk seizes the opportunity to use the computer to
complete a school assignment.
She creates a few files in the process and saves them on the
desktop. When she is finished, she copies the assignment
files, and others, to her USB flash drive. Later that day, she
hands over her flash drive to a lab attendant to get her files
printed. The attendant opens the folder and a particular file
catches his attention.
● File integrity is the accuracy, completeness and internal
consistency of the data stored in a file.
● File integrity is a means to keep the data accurate for
use.
● Maintaining file integrity goes hand in hand with data
security, which involves keeping data safe from
breaches.
File integrity measures include:
● Overwrite protection
● Read-only access
● Restricted access
● Virus protection
● Encryption
● Files must be kept secure from a wide range of threats,
some deliberate, others accidental.

● Deliberate threats come from persons within the


organisation as well as others on the outside.

● Accidental threats come in the form of hardware


problems, software glitches, malware and viruses, user
errors and mishaps, and the effects of natural disasters.
Several countermeasures are used to safeguard files
● Passwords
● Firewall
● Disaster recovery mechanisms

You might also like