[go: up one dir, main page]

0% found this document useful (0 votes)
3 views12 pages

L3 Data Protection

Uploaded by

Mark Superville
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views12 pages

L3 Data Protection

Uploaded by

Mark Superville
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Data Protection

Data Integrity
Data is said to have integrity if it is accurate and
complete when it enters a system and it does not
become inaccurate after further processing. Data
integrity can be compromised in a number of ways:
• human error (such as inaccurate data entry, accidental deletion and
accidental changing of data)
• natural disasters such as fires, floods and earthquakes
• malware
• hardware failure
• fraud
• malicious deletion or changing of data.
Physical data security

One or a combination of the following methods may enforce this:


 Locks, security guards, burglar alarms
 intrusion detection systems (monitoring video cameras, face
recognition)
 electronic doors using passwords or magnetic cards with a PIN
(personal identification number), as well as a numeric password
assigned to each individual user of a system
 biometric devices that confirm (authenticate) a person’s
identity.
Software Based Data Security

 Encryption
 Firewall
 Passwords
Data protection refers to computer users
who can protect their data against loss or
damage.
Surveillance

Computer surveillance involves the use of technology to gather information from the
user and from the computer, often without the user’s knowledge. Monitoring entrances
and exits together with methods to identify authorised personnel is a typical method
used to identify a threat. This method of security is employed to protect the physical
surroundings, that is the building and rooms with computers in them. Common
approaches to physical security include:
 closed-circuit TV monitors
 electronic alarm systems
 computer-controlled locks that check employee badges
 biometric recognition, such as fingerprints, retina scans and voice to authorise entry
to different rooms or buildings
 access codes.
Protection from nature

Data should also be protected from natural disasters, including


the risk of fire, storm damage, dust and humidity.
 Use fireproof cabinets and safes
 Store backup data at a secondary location or cloud storage
 Use uninterruptible power supply (UPS) to protect computer
hardware from electrical surge and spikes. This device
contains a battery which supplies equipment with electricity
during a power outage so that data can be saved.
Preventing viruses

 UseVirus protection programs called Anti-


Virus Software
 Turn on Program virus protection
 Know the origin of the program or file
before you download
 Never
open emails attachments with
executable (.exe) files
Network and cyber security

Companies address cyber threats with


encryption and decryption techniques.
They encode data before transmission so
that it appears unintelligible unless it is
decrypted using a software key.
Protecting files and databases

Backups and archives


 Making backups (copies) of files is always important. For
businesses and other organisations that depend on
databases it is essential. Files can become damaged,
corrupted or even lost.
 An archive preserves files that you no longer need on a
regular basis. By putting them in a storage space on
your hard disk (or network drive). Archives can be
extracted if the need arises, usually for reference.
Question

1. Explain why each of the following methods of file storage is important:


a) making backups
b) archiving.
2. Indicate whether the following statements are true or false:
a) Virus protection programs only scan a computer’s data for harmful viruses.
b) Software piracy is the authorised distribution and use of computer programs.
c) An individual has no right to examine the contents of any personal record representing
him/her.
d) Information should not be held for longer than necessary
e) The privacy of the individual should be protected.
Question

3 State the type of protection for each of the following


descriptions:
a) to keep critical data stored on media such as optical
disks protected from risk of fire
b) to protect computer hardware against electrical surges
and spikes
c) to prevent theft of the system units and peripherals
d) to monitor suspects, often without their knowledge.

You might also like