Notes - Data Security and Data Integrity
Notes - Data Security and Data Integrity
Data is said to have integrity if it is accurate and complete when it enters a system and does not
become inaccurate after further processing. Data integrity can be comprised in a number of
ways:
● Inaccurate data entry
● Viruses
● Hardware malfunctions
● Accidental or malicious deletion or changing of data
● Natural disasters such as fires, floods and earthquakes
Data security is a method used to ensure that data maintains integrity. This usually involves:
physical safeguards and software safeguards.
This deals with the protection of hardware and software from accidental or malicious damage or
destruction. For instance:
1. Use of a monitoring system using video cameras
2. Security guards
3. Storing data in a fire/water proof safe
4. Storing data in another building or in another location
5. Distributing sensitive work to a number of employees rather than just one.
Reference
http://csecinfotech.pbworks.com/w/page/32732345/Lesson%204-6%3A%20Data%20Integrity
%20and%20Security
MISUSE OF INFORMATION
Organisations gather information from a wide variety of sources including employees, suppliers,
customers and competitors. When information is voluntarily provided to an organisation, it is
usually for a specific purpose, e.g. for hospitals, clinics, insurance agencies etc.
Measures should therefore be in place to ensure that information is not misused. However,
security breaches are common. Also, the use of information for purposes other than that which
it was originally intended for is also common. Some countries have legislation that seeks to
protect individuals from the potential misuse of information, such as:
1. Information should be used only for the purpose for which it was provided
2. The individual has the right to examine the contents of any personal record representing the
individual.
3. The information must be accurate.
4. Security measures must be put into place to protect information.
5. The privacy of the individual must be protected.
COMPUTER CRIMES
Computers have given employees new tools that makes their jobs easier and allowed them to
do things that was not possible before. Unfortunately, this is also true for criminals.
Defn: A computer crime is any illegal action where the data on a computer is accessed without
permission.
This access doesn't have to result in loss of data or even data modifications. The worst
computer crime occurs when there are no indications that data was accessed. Computer crime
is often committed by hackers and crackers, but increasingly organized crime groups have
realized the relative ease of stealing data with relative low-level of risk.
Defn: A hacker is a person who breaks into computers and computer networks, either for profit
or just to prove that they can.
Defn: A cracker is someone who breaks into someone else's computer system, often on a
network; bypasses passwords or licenses in computer programs.
1. Unauthorised Access - This usually involves 'hacking' or 'cracking'. Some hackers see
their activities as a form of game-playing, where they try to match their skills against other
hackers, others have more destructive intentions such as breaking into an organisation's
computer system to commit acts like 'electronic vandalism' (e.g. deleting files, corrupting
software, and changing critical data).
a. Monitoring with utility software - all data that passes in and out of a network or an
individual's computer can be monitored. This is also known as 'packet sniffing', where a packet
is the message being checked. Messages can be monitored by utility software (such as Packet
Analyzer)or by using a computer on a network which can observe all packets passing through
the network.
c. Monitoring from a distance - done by the use of commercially available equipment which
can receive and process the radiation emittedby the monitor. Data being displayed on the
screen at the moment can then be observed without the knowledge of the user.
Defn: Copyright is the name given to the protection law of the rights of the person(s)
responsible for creating items such as text, a piece of music, a painting or a computer program.
Consider the application Microsoft Word, which was written and improved by hundreds of
programmers. If someone else were to copy the program code or steal it, it would be both
unfair and illegal. A copyright law (enforced by the Intellectual Properties Affairs office in a
country) would make it a criminal offence to be caught copying or stealing software.
Defn: Software piracy is the theft of computer programs and the unauthorised distribution and
use of these programs.
Reference http://csecinfotech.pbworks.com/w/page/32984615/Lesson%204-7%20%3A
%20Misuse%20of%20Information%20and%20Computer%20Crimes