Data Security and Integrity: Software and Physical Restrictions

Only available on StudyMode
  • Download(s) : 670
  • Published : October 21, 2012
Open Document
Text Preview
Table of Contents

Page #
Introduction ………………………………………..................................... 3

Maintenance of data security and integrity in reference to: * Software Access Restrictions ………………………………..... 4-5

* Physical Access Restrictions ………………………………….. 6-7

Summary ………………………………………………………………... 8

Bibliography …………………………………………………………….. 9

Introduction

Maintenance of data security and integrity in reference to:
Software Access Restrictions

These are inserted for the purposes of protecting computer software. A few forms of software access restrictions are as follows:

* Passwords

Definition:
-A string of characters that allows access to a computer, interface or system.

How does it assist in securing data and maintaining its integrity? When a person creates a password for access to a computer, folder, program etc. they are creating a code that must be implemented every time they wish to access the software. This means that if any unknown or unauthorized personnel were to attempt to view the material and were unaware of the password then they would be unable to do so, thus securing the data. The integrity of the data is also highly protected when using a password because if any unknown or unauthorized personnel attempt to access any data that is password protected without knowing the password, they will be denied access. Thus the data cannot be altered in any way and its trustworthiness would remain the same.

* Data Encryption

Definition:
-This is the encryption (encoding) of data for security purposes.

How does it assist in securing data and maintaining its integrity? By encrypting, we change the original plaintext version of data into ciphertext, which is an unreadable format that will protect against unauthorized parties. Only those who possess the key to trigger the algorithm that will decrypt the data, hence making it readable, can access it. A higher bit encryption is much more secure than a lower bit encryption, for example a 256 bit encryption is much more secure than a 128 bit encryption because a hacker will need to try out more possibilities when trying to breach the encryption. Once data is encrypted the integrity of it is safeguarded just as long as it isn’t breached by a hacker or accessed by any unauthorized party who somehow got the key to the algorithm, and was able to decrypt the data. * Virus Protection

Definition:
-This is the protecting of a system from a file that replicates itself without the consent of the user.

How does it assist in securing data and maintaining its integrity? Typical anti-virus software protects a computer system from viruses, Trojan horses, worms etc. by means of routinely or manually scanning files and programs to check for the aforementioned malware and if any malicious content is found, it either notifies the user of its presence and suggests steps that can be taken to remove it, or automatically starts doing so by itself. Any malware that is located early enough by anti-virus software can usually be removed before it can cause any irreversible damage to data. Though there are viruses that can take effect almost immediately and corrupt data very quickly before the virus protection can take action or even notice it. In this case having better virus protection software is necessary.

* Firewall

Definition:
-This is an integrated collection of security measures designed to prevent unauthorized electronic access to a networked computer system.

How does it assist in securing data and maintaining its integrity? A firewall protects a computer system or network from any malicious activity from the internet, for e.g. hackers, viruses and Trojan horses. They do so by filtering any incoming packets of data to decide which data will be let through the firewall and which will be discarded. This means that data already on the computer or network will be better protected...
tracking img