Data Integrity and security Flashcards
What is data integrity?
Data integrity relates to the consistency, accuracy and reliability of data.
What is the goal of data integrity?
The goal of data integrity is to protect against data being changed, deleted or substituted without authorization.
Name ATLEAST 4 ways in which data integrity can be comprimised
- Human error (Innacurate data entry, accidental changing of data)
- Natural Disasters
- Worms and viruses
- hardware malfunctions
- Fraud
- Malicious deletion or changing of data
What is data security?
Data security means protecting information from unauthorized access, use, disclosure, disruption, modification or destruction
*What are the 2 types of data security?
Physical ( e.g: locks, fireproof safes etc)
Software( e.g: audit trails, passwords etc)
Name ATLEAST 5 methods of physical data security
- Locks
- Security Guards
- Burglar Alarms
- Monitoring system using video cameras
- Biometric scans
- Electronic doors that can only be opened using passwords
or magnetic cards - Outer structural security
- Storing data in a fireproof safe or cabinet
- Storing data in another building or in another location
- Distributing work to a number of employees instead of
just one
Name ATLEAST 4 methods of software based data security
- Password for the system
- Password for individual files or folders
- Audit trials or access logos
- Encryption – This is encoding(scrambling ) data during
storage or transmission so that it cannot be understood. - Firewall-This is a program, a hardware device or a
combination of both that filters the information coming in
through your computer system or network connection or
internet - Antivirus software
What is a computer virus?
A computer virus is a small program written to alter the way a
computer operates, without the permission or knowledge of
the user.
What is a worm?
Worms are programs that replicate themselves from system
to system without the use of a host file. This is in contrast to
viruses, which requires the spreading of an infected host
file.
What is a trojan horse
Trojan horses are impostors—files that claim to be
something desirable but, in fact, are malicious.
What is data privacy?
Information privacy, or data privacy is the relationship
between collection and dissemination of data,
technology, the public expectation of privacy, and the
legal and political issues surrounding them.
Name ATLEAST 4 computer crimes
- Software piracy
- Hacking
- Cracking
- Internet Fraud
- Industrial espionage
define biometrics
Biometrics is the automated method of recognizing a
person based on a physiological or behavioral
characteristic.
List ATLEAST 4 types of biometric input
- Fingerprints
- Face Recognition
- Speaker Recognition
- Iris Recognition
- Hand and Finger Geometry
- Signature Verification
Define the term: computer crime
criminal
activity involving an information technology
infrastructure.