Preview

Data Security and Integrity: Software and Physical Restrictions

Good Essays
Open Document
Open Document
1277 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Security and Integrity: Software and Physical Restrictions
Table of Contents

Page # Introduction ………………………………………..................................... 3

Maintenance of data security and integrity in reference to: * Software Access Restrictions ………………………………..... 4-5

* Physical Access Restrictions ………………………………….. 6-7

Summary ………………………………………………………………... 8

Bibliography …………………………………………………………….. 9

Introduction

Maintenance of data security and integrity in reference to:
Software Access Restrictions

These are inserted for the purposes of protecting computer software. A few forms of software access restrictions are as follows:

* Passwords

Definition:
-A string of characters that allows access to a computer, interface or system.

How does it assist in securing data and maintaining its integrity?
When a person creates a password for access to a computer, folder, program etc. they are creating a code that must be implemented every time they wish to access the software. This means that if any unknown or unauthorized personnel were to attempt to view the material and were unaware of the password then they would be unable to do so, thus securing the data.
The integrity of the data is also highly protected when using a password because if any unknown or unauthorized personnel attempt to access any data that is password protected without knowing the password, they will be denied access. Thus the data cannot be altered in any way and its trustworthiness would remain the same.

* Data Encryption

Definition:
-This is the encryption (encoding) of data for security purposes.

How does it assist in securing data and maintaining its integrity?
By encrypting, we change the original plaintext version of data into ciphertext, which is an unreadable format that will protect against unauthorized parties. Only those who possess the key to trigger the algorithm that will decrypt the data, hence making it readable, can access it. A higher bit



Bibliography:

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    Encryption is the process of transforming normal content, called plaintext, into unreadable gibberish, called ciphertext.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Lab 1 Essay Example

    • 504 Words
    • 2 Pages

    It is known as not a normal practice, it is used for applications or programs to read the users password for permission to use. It stores the password as plain text, and used in last resort situations where there is no need to protect the password or other options are outweighed for risk.…

    • 504 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Kudler Fine Foods located in San Diego, California is a specialty food store that is continuing to grow. Due to the company’s growth, it is necessary for Kudler to make a better use of technology for all aspects of the business. Currently Kudler process a large amount of data through computer programs which is used between all three locations, but with upcoming expansions, Kudler needs the ability to track all of that information and also be confident that the information is reliable. With that being said, Kudler would benefit greatly from Computer Assisted Auditing Techniques (CAATs).…

    • 1049 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    -Subpart B. Unauthorized use. Users must abide by the security restrictions on all systems and information to which access is authorized.…

    • 477 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Ais Project

    • 1021 Words
    • 5 Pages

    (2)Because if your password is known by others, these people might log on the system to see what you do.…

    • 1021 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Lesson 9

    • 673 Words
    • 3 Pages

    ___j____ 6. This software restriction policy rule will prevent executables from running if they have been modified in any way by a user, virus, or piece of malware.…

    • 673 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    The different information systems are filing cabinets where hard copies are stores or electronically which can be saved changes can be made and they can be made safe with a password.…

    • 802 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cu2479

    • 439 Words
    • 2 Pages

    2.2 Password protected computers/files give security for stored information so only people with the password can see/edit/add to this information.…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    09 Project Conclusion

    • 285 Words
    • 1 Page

    The encryption system translates the biometric data file into a code using a mathematical tool called a hash function. This is an algorithm that generates a small but unique set of numbers from a larger data file. Although encryption may be confusing for most people, it is a very effective way to protect someone’s biometric data. Encryption adds an additional measure of security to the system so that certain viruses and malware cannot penetrate it. It also makes one’s personal data twice as hard for cyber criminals to hack into. Without encryption, biometric data would be more likely to be accessed and compromised. Using encryption makes biometric data more difficult to penetrate, ensuring that the information therefore, is safe, protected and the user’s privacy is still intact.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    11. To show what an attacker would have access to if they were in the system.…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…

    • 838 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Data Security

    • 335 Words
    • 2 Pages

    7. Each of the following is a variation available in network access control (NAC) implementations except __________.…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Study Guide

    • 508 Words
    • 3 Pages

    One technique is to restrict access to the password file using standard access control measures. Another technique is to force users to select passwords that are difficult to guess.…

    • 508 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Encryption works by scrambling the original message with a very large digital number (key). This is done using advanced mathematics. Commercial level encryption uses 128-bit key that is very difficult to crack, even whilst using advanced software. The computer receiving the message understands and recognises the digital key; therefore, it is able to comprehend the intended message.…

    • 607 Words
    • 3 Pages
    Good Essays