0% found this document useful (0 votes)
14 views5 pages

Data Security and Integrity

The document discusses data security and integrity, emphasizing the importance of protecting data from unauthorized access and loss through physical and logical security measures. It also outlines the Data Protection Act (1984), which regulates the use of personal data by organizations, and highlights various types of computer crimes and data protection strategies. Additionally, it touches on concepts such as cyber wellness, copyright issues, intellectual property, plagiarism, and business ethics.

Uploaded by

takatendac
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views5 pages

Data Security and Integrity

The document discusses data security and integrity, emphasizing the importance of protecting data from unauthorized access and loss through physical and logical security measures. It also outlines the Data Protection Act (1984), which regulates the use of personal data by organizations, and highlights various types of computer crimes and data protection strategies. Additionally, it touches on concepts such as cyber wellness, copyright issues, intellectual property, plagiarism, and business ethics.

Uploaded by

takatendac
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

DATA SECURITY AND INTEGRITY

1. Data Security
Data security refers to the means of protecting data from unauthorized access and from deliberate
or accidental loss.
It includes the safety of data from any form of hazard like floods, theft of the computer, fire, etc.
Data security can be achieved by:
Physical Security measures against hardware and data loss.
 Locking the computer room.
 Employing security guards.
 Installing burglar bars on windows.
 Use of screen gates.
 Installing an electric fence around the computer room.
 Constructing a durawall around the computer room.
 Installing fire extinguishers inside the room.
 Building the computer room on higher grounds to avoid flooding.
 Installing a generator to avoid data loss through power cuts.
 Installing an Uninterruptible Power Supply (UPS) to prevent data loss through power
cuts:
NB: a UPS is a device connected between a computer and a power source to ensure that
electrical flow is not interrupted. UPS devices use batteries to keep the computer running for a
period of time after a power failure. UPS devices usually provide protection against power
surges and blackouts as well.
Logical security
Measures against unauthorized access to data held in the computer:
 Use of data encryption methods before sending (data encryption is the scrambling of data
before sending, for security reasons).
 Use of passwords.
 Use of firewalls.
 Use of iris and palm recognition systems.
 Installing the latest anti-virus software.
 Log users for computer use.
 Use call back facility for incoming information. Check references of potential staff for
employment purposes. Divide jobs between several people and then supervise the staff.

2. Data integrity
This refers to the correctness and accurateness of data held in the computer. The issue of data
integrity and security lead to the introduction of some data protection laws which govern how
organizations holding public data must operate.
THE DATA PROTECTION ACT (1984)
This tries to regularize the use of automatically processed individual information by
organizations. The Act outlines some of the following rules:
 Organizations using personal data must be registered.
 Data about individuals must be obtained fairly and lawfully for the purpose collected for.
 Data must be used only for the specific purpose collected for and may only be disclosed
in accordance with such a purpose.
 Data collected must not be excessive for the purpose collected for but must be adequate
and relevant.
 Data collected must be accurate, up-to-date and kept no longer than necessary.
 Data must be protected from unauthorised access or loss.
 Individuals with collected data have the right to view it and make alterations where
necessary.
COMPUTER CRIME
Computer crime also called cybercrime is the use of computer as an instrument to further illegal
ends such as committing fraud, trafficking in child pornography and intellectual property.
Or it is unauthorized use of computers for personal data.
Types of crimes
 Internet fraud
 ATM fraud
 Child pornography
 Hacking
 Computer viruses
 Denial of service attack
 Phishing
 Pharming
DATA PROTECTION MEASURES
Data protection is a set of strategies and processes one can use to secure the privacy, availability
and integrity of data. It is also called data security and information security.
Types of data protection measures
Logical security, which includes firewalls, encryption etc
Data backup
Is the practice of copying data from a primary to a secondary storage location to protect it in case
of disaster, accident, or malicious action?
Primary storage is keeping data internally in the computer eg in the hard drive
Secondary storage is keeping data outside the computer eg in the cloud storage, flash drive,
external hard drive CDs
Disaster recovery plan
A disaster recovery plan is a documented plan, structured approach that describes how an
organization can quickly resume work after unplanned incident.
Helps in times of:-
 Natural disaster eg earthquake, flood
 A building failure
 Transport failure
 Theft or distraction of physical documents
 Theft of company hardware
 An IT system getting hacked

Cyber wellness/ unhu/ Ubuntu/vumunhu


 Refers to the positive well-being of internet users.
 It involves an understanding of online behavior and awareness of how to protect oneself
in cyberspace.
 The focus on CW is about helping students to become responsible digital learners
 When navigating cyberspace, students should demonstrate respect for self and others and
practice safe and responsible use.
 Learners should also be a positive peer influence by harnessing technology for
collaboration, learning and productivity, as well as advocating positive use of technology
for the good of the community.
Cyber wellness principles
 Respect for self and others
 Safe and responsible use positive peer influence
What are copy right issues?
Copy right is a form of intellectual property that promotes literary and artistic works from
exploitation without authorization from the owner. In simple terms, copy right is the right copy.
This means that the original creators of product and any one they give authorization to are the
only ones with the exclusive right to reproduce the work.
What is intellectual property?
It refers to creations of mind, such as inventions, literary and artists’ works
designs, and symbols, names and images used in commerce
Types of intellectual property
 Copyright
 Patents
 Trademarks
 Trade secrets
What is Plagiarism?
Plagiarism is presenting someone else’s work or ideas as your own, with or without their
consent.
OR
Plagiarism is when you use someone’s words or ideas and pass them off as your own.
Business ethics
1. Business ethics refers to the standards for morally right and wrong conduct in business.
2. Business ethics is a set f moral rules that govern how business operate, how business
decisions are made and how people are treated.
Attributes of business ethics
 Honesty
 Integrity
 Fairness
 Dedication
 Responsibility
 accountability

Ethics are moral principles, or rule which govern a person’s attitude and behavior
Questions
1. Identify five sources to start a business
 financial resources(funding)
 human resources(employees)
 educational resources (industry know how)
 physical resources (premises and equipment)
 emotional resources (support systems)
2. What is data privacy and why is it important?
3. State and explain five data protection measures

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy