By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
-
Upload
alexandrina-obrien -
Category
Documents
-
view
219 -
download
0
Transcript of By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.
![Page 1: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/1.jpg)
By Mrs. Smith
DATA INTEGRITY AND SECURITY
![Page 2: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/2.jpg)
Accurate
Complete
Valid
Data Integrity
![Page 3: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/3.jpg)
Data integrity refers to the validity of data.Making sure data stored is accurate.Ensuring data stored is not intentionally altered.
Data Integrity
![Page 4: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/4.jpg)
Inaccurate data entryVirusesHardware malfunctionsAccidental or Malicious
deletion or changing of data
Natural Disasters
How can data integrity be
compromised?
![Page 5: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/5.jpg)
Data security is ensuring your data is not compromised.
Data security can be classified into two main groups:Physical safeguards Software safeguards
Data Security
![Page 6: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/6.jpg)
Physical Safeguards
![Page 7: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/7.jpg)
Only allow authorized
personnel access to computer
facilities.
![Page 8: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/8.jpg)
Hire Security Guards
![Page 9: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/9.jpg)
Install monitoring systems using video cameras
![Page 10: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/10.jpg)
Storing backed up data in a
fireproof safe
![Page 11: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/11.jpg)
Installing locks on doors
![Page 12: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/12.jpg)
Software Safeguards
![Page 13: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/13.jpg)
#1Using Passwords to
access the Computer System
![Page 14: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/14.jpg)
![Page 15: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/15.jpg)
#2Using passwords for individual files
or folders.
![Page 16: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/16.jpg)
#3Data Encryption –
Coding/ Scrambling your data
the encoded version of a message
![Page 17: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/17.jpg)
#4Installing a Firewall
(filters the information coming to your computer from the Internet)
![Page 18: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/18.jpg)
Viruses
![Page 19: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/19.jpg)
A malicious program that activates itself unknown to the user and destroys or corrupts data.
What is a virus?
![Page 20: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/20.jpg)
Downloading infected programs and files from t he internet
Opening infected files received through emails
Using storage devices that contain infected files
How are they usually spread?
![Page 21: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/21.jpg)
A business can lose millions of dollars due to: data corruption, Lost data and computer down time
Effects of viruses
![Page 22: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/22.jpg)
Install antivirus software and always keep it up to date with the latest virus definitions
Do not use storage devices from other computers in your computer unless you scan for viruses first
Do not open email attachments that contain .exe, .com or .vbs file extensions
Prevention and protection against
viruses
![Page 23: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/23.jpg)
The right of individuals to determine what information is being kept about them and how the information will be used.
Data privacy act 1984 – requires that all data being kept about an individual be accurate and used only for the purpose for which it was collected
Data privacy
![Page 24: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/24.jpg)
It requires that all data being kept about an individual be accurate and used only for the purpose for which it was collected
Data Privacy Act1984 USA
![Page 25: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/25.jpg)
Ensures that any organization, company or governmental organization storing information on individuals abides by the following rules:Data must not be used for any purpose other than what it
was collected forData must be updated to maintain integrityData must be protected from unauthorized access and use Individuals have the right to check data held about them
Data Protection Act 1998 UK
![Page 26: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/26.jpg)
This act ensures:TransparencyAccountabilityEquality of AccessEmpowerment and Increased Participation
Freedom of Information Act 1999 TT
![Page 27: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/27.jpg)
Software piracyHackingInternet Fraud
COMPUTER CRIMES
![Page 28: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/28.jpg)
![Page 29: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/29.jpg)
![Page 30: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/30.jpg)
The unauthorized copying, use or selling of software that is copyrighted
Software Piracy
![Page 31: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/31.jpg)
The unauthorized accessing of a computer system: To steal confidential data To copy computer programs illegally To alter data To destroy data (deleting or
implanting virus) To transfer money using Electronic
Funds Transfer (EFT)
Hacking
![Page 32: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/32.jpg)
![Page 33: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/33.jpg)
Mainly the bogus selling of products over the internet
![Page 34: By Mrs. Smith DATA INTEGRITY AND SECURITY. Accurate Complete Valid Data Integrity.](https://reader033.fdocuments.in/reader033/viewer/2022051619/56649d9f5503460f94a89c2f/html5/thumbnails/34.jpg)
For a copy of this powerpoint and further reading:
www.yolasite.chss.com