0% found this document useful (0 votes)
2 views

Ch 6 Security - Copy

The document outlines key concepts of data security, including data integrity, privacy, and overall security measures. It details various protection strategies such as encryption, data backup, firewalls, user accounts, anti-malware, and access rights. Additionally, it emphasizes the importance of backup frequency, medium, location, scope, and timing to ensure data continuity and protection against loss.

Uploaded by

huzaifahanis106
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Ch 6 Security - Copy

The document outlines key concepts of data security, including data integrity, privacy, and overall security measures. It details various protection strategies such as encryption, data backup, firewalls, user accounts, anti-malware, and access rights. Additionally, it emphasizes the importance of backup frequency, medium, location, scope, and timing to ensure data continuity and protection against loss.

Uploaded by

huzaifahanis106
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 13

Security

The Primary Concepts

• Data Integrity:
⚬ Ensures the accuracy and validity of data. This means the data received
is exactly as sent, without any alteration or corruption. Methods like
parity checks are used to verify that data has not been tampered with
during transmission.
• Data Privacy:
⚬ Maintains the confidentiality of data so that it is only accessible to
authorized individuals. This is crucial for personal data and sensitive
information that requires restricted access.
The Primary Concepts

• Security:
⚬ Encompasses overall measures to keep data safe and prevent data loss.
This includes strategies like regular data backups to safeguard against
data loss due to system failures or other incidents.
Protection Strategies
• Encryption:
⚬ Encryption is a process that uses algorithms to transform readable data
(plaintext) into a coded form (ciphertext) that is unreadable to
unauthorized users.
⚬ It scrambles the source code or data using an encryption key, making
the content inaccessible without the corresponding decryption key.
⚬ If a file encrypted with a strong encryption algorithm is accessed without
authorization, the contents will appear meaningless. To revert the data
back to its original form (decryption), the correct decryption key is
required, which is typically only known to the intended recipient or
authorized users.
Protection Strategies

• Data Backup
⚬ Involves creating and storing a copy of data in a separate location.
⚬ If the original data is lost, the backup can be utilized to restore the data,
ensuring data continuity.
• Disk Mirroring
⚬ Data is simultaneously stored on two separate disks.
⚬ If one disk fails, the system can continue to operate using the second
disk without data loss, providing real-time data redundancy.
Protection Strategies

• Firewall
⚬ A firewall is a security system that controls incoming and outgoing
network traffic.
⚬ It prevents unauthorized access to or from a private network and blocks
data packets from suspect sources.
⚬ Maintains a list of permitted or denied communications based on a set
of security rules.
⚬ Can be implemented in both hardware and software or a combination of
both.
⚬ Helps protect against cyber threats, such as hacking attempts.
The Backup Strategy

• Frequency of Backup: Determine how often the data needs to be backed


up. For example, daily backups may be necessary for environments where
data changes frequently, such as a school where students' progress is
updated daily.
• Backup Medium: Choose the appropriate medium for data backup based
on capacity and reliability. An external hard drive is often used due to its
larger storage capacity and portability.
The Backup Strategy

• Location of Backup: Decide where to store the backup copies. Off-site


storage is recommended to prevent data loss in case of physical damage
to the primary location, ensuring that copies remain safe even if the
original data is compromised.
• Scope of Backup: Identify which data needs to be backed up. In many
cases, it's sufficient to backup only the files that have been updated since
the last backup to save time and storage space.
The Backup Strategy

• Timing of Backup: Schedule backups for times that do not interrupt


business operations or when system use is low, such as overnight, to
minimize the impact on system performance and ensure that backups are
as up-to-date as possible.
Protection Strategies

• User Account
⚬ A security feature requiring a username and password for system
access.
⚬ Resource access can be restricted to specific accounts, enhancing
control over who can see or modify data.
⚬ Ensures that systems and sensitive data cannot be accessed without
proper credentials.
Protection Strategies

• Anti-Malware
⚬ This software scans for and identifies malicious code, also known as
malware, which can be harmful to computer systems.
⚬ It has the capability to quarantine (isolate) or delete any detected
malware to prevent damage.
⚬ Regular scans can be scheduled to ensure continuous protection.
Protection Strategies
• Access Rights
⚬ Access rights can be set for individuals or groups to define what actions
they can perform on a system or with software, such as preventing
unauthorized editing of programs.
• Physical Measures
⚬ Physical security measures like locked doors or secure keyboards
prevent unauthorized physical access to computer systems.
Protection Strategies
• Up-to-Date Antivirus:
⚬ Ensures real-time protection against new threats by keeping the
antivirus definitions current.
• Strong Authentication:
⚬ Utilizing strong biometrics or passwords helps to verify a user's identity
and prevent unauthorized access.

You might also like