protecting data and information

?
  • Created by: rbird123
  • Created on: 02-12-20 14:07

IT  Learning Aim D - Protecting Data and Information

Integrity 

Accuracy of data 

Phishing 

the fraudulent practice of sending emails purporting to be from reputable companies

Firewall

A network device which block certain kinds of network traffic

Virus

A small piece of software that someone can attach to a host program

Worm

A worm is a stand alone malware program that spreads to other computers

Ransomware

Malicious software that once installed on a computer, denies access to the computer

Encryption

Wncryption is the encoding of the data so that it cannot be read directly.

Threats to Data 

Integrity of data 

Data integrity refers to the accuracy and correctness of data. Organisations need to ensure that procedures are in place to help maintain data integrity during collect and processing. 

Data Entry 

Data validation should be used to ensure the values that the user can enter are restricted. Data validation  checks includes, type checks, range checks, format checks, length checks and presence checks. 

Data verification is the process of entering data twice, with the second entry being automatically checked against the first.. If they match the data is accepted. 

Data Processing

Data may be corrupted during processing if a procedure is carried out incorrectly, or if there is an error in the computer that carries out the processing of the data 

Training in the correct processing of data, and throughout testing of the software prior to implementation are two ways of guarding against this.

Security 

Keeping data secure means keeping it safe from accidental destruction, being stolen and misused or deliberately corrupted or destroyed. 

Measures to prevent this include;

Restricting file access to authorised people to reduce the likelihood of accidental corruption or deletion. 

Having robust back

Comments

No comments have yet been made