Data Security and Integrity
Data Security and Integrity
1. Data Security
Data security refers to the means of protecting data from unauthorized access and from deliberate
or accidental loss.
It includes the safety of data from any form of hazard like floods, theft of the computer, fire, etc.
Data security can be achieved by:
Physical Security measures against hardware and data loss.
Locking the computer room.
Employing security guards.
Installing burglar bars on windows.
Use of screen gates.
Installing an electric fence around the computer room.
Constructing a durawall around the computer room.
Installing fire extinguishers inside the room.
Building the computer room on higher grounds to avoid flooding.
Installing a generator to avoid data loss through power cuts.
Installing an Uninterruptible Power Supply (UPS) to prevent data loss through power
cuts:
NB: a UPS is a device connected between a computer and a power source to ensure that
electrical flow is not interrupted. UPS devices use batteries to keep the computer running for a
period of time after a power failure. UPS devices usually provide protection against power
surges and blackouts as well.
Logical security
Measures against unauthorized access to data held in the computer:
Use of data encryption methods before sending (data encryption is the scrambling of data
before sending, for security reasons).
Use of passwords.
Use of firewalls.
Use of iris and palm recognition systems.
Installing the latest anti-virus software.
Log users for computer use.
Use call back facility for incoming information. Check references of potential staff for
employment purposes. Divide jobs between several people and then supervise the staff.
2. Data integrity
This refers to the correctness and accurateness of data held in the computer. The issue of data
integrity and security lead to the introduction of some data protection laws which govern how
organizations holding public data must operate.
THE DATA PROTECTION ACT (1984)
This tries to regularize the use of automatically processed individual information by
organizations. The Act outlines some of the following rules:
Organizations using personal data must be registered.
Data about individuals must be obtained fairly and lawfully for the purpose collected for.
Data must be used only for the specific purpose collected for and may only be disclosed
in accordance with such a purpose.
Data collected must not be excessive for the purpose collected for but must be adequate
and relevant.
Data collected must be accurate, up-to-date and kept no longer than necessary.
Data must be protected from unauthorised access or loss.
Individuals with collected data have the right to view it and make alterations where
necessary.
COMPUTER CRIME
Computer crime also called cybercrime is the use of computer as an instrument to further illegal
ends such as committing fraud, trafficking in child pornography and intellectual property.
Or it is unauthorized use of computers for personal data.
Types of crimes
Internet fraud
ATM fraud
Child pornography
Hacking
Computer viruses
Denial of service attack
Phishing
Pharming
DATA PROTECTION MEASURES
Data protection is a set of strategies and processes one can use to secure the privacy, availability
and integrity of data. It is also called data security and information security.
Types of data protection measures
Logical security, which includes firewalls, encryption etc
Data backup
Is the practice of copying data from a primary to a secondary storage location to protect it in case
of disaster, accident, or malicious action?
Primary storage is keeping data internally in the computer eg in the hard drive
Secondary storage is keeping data outside the computer eg in the cloud storage, flash drive,
external hard drive CDs
Disaster recovery plan
A disaster recovery plan is a documented plan, structured approach that describes how an
organization can quickly resume work after unplanned incident.
Helps in times of:-
Natural disaster eg earthquake, flood
A building failure
Transport failure
Theft or distraction of physical documents
Theft of company hardware
An IT system getting hacked
Ethics are moral principles, or rule which govern a person’s attitude and behavior
Questions
1. Identify five sources to start a business
financial resources(funding)
human resources(employees)
educational resources (industry know how)
physical resources (premises and equipment)
emotional resources (support systems)
2. What is data privacy and why is it important?
3. State and explain five data protection measures