protecting data and information
- Created by: rbird123
- Created on: 02-12-20 14:07
IT Learning Aim D - Protecting Data and Information
Integrity
Accuracy of data
Phishing
the fraudulent practice of sending emails purporting to be from reputable companies
Firewall
A network device which block certain kinds of network traffic
Virus
A small piece of software that someone can attach to a host program
Worm
A worm is a stand alone malware program that spreads to other computers
Ransomware
Malicious software that once installed on a computer, denies access to the computer
Encryption
Wncryption is the encoding of the data so that it cannot be read directly.
Threats to Data
Integrity of data
Data integrity refers to the accuracy and correctness of data. Organisations need to ensure that procedures are in place to help maintain data integrity during collect and processing.
Data Entry
Data validation should be used to ensure the values that the user can enter are restricted. Data validation checks includes, type checks, range checks, format checks, length checks and presence checks.
Data verification is the process of entering data twice, with the second entry being automatically checked against the first.. If they match the data is accepted.
Data Processing
Data may be corrupted during processing if a procedure is carried out incorrectly, or if there is an error in the computer that carries out the processing of the data
Training in the correct processing of data, and throughout testing of the software prior to implementation are two ways of guarding against this.
Security
Keeping data secure means keeping it safe from accidental destruction, being stolen and misused or deliberately corrupted or destroyed.
Measures to prevent this include;
Restricting file access to authorised people to reduce the likelihood of accidental corruption or deletion.
Having robust back…
Comments
No comments have yet been made