Data Security and Privacy - Student Notes
Data Security and Privacy - Student Notes
Data Privacy
Data privacy refers to the right of individuals or organizations to deny or restrict
the collection and use of information about them. Data Privacy also requires
system managers to reduce unauthorized access into their systems by building
physical arrangements and software checks.
This act gives the individual the right to know that data identifying them is being
held, why it is being held and how it is being used.
Page 1 of 5 K Aquilina
Student Notes Theory
Data Security
Data security involves the use of various methods to make sure that data is
correct, kept confidential and is safe.
Data security includes;
Ensuring integrity of data.
Ensuring privacy of data.
Prevent the loss or destruction of the data
a) ___________________
Encryption software scrambles the data with a secret code so that no one can
make sense of it while it's being transmitted. When the data reaches its
destination, the same software unscrambles the information. When you see a
small lock icon at the bottom of your browser, it indicates that your data will be
encrypted during transmission.
b) ___________________________
Most multiuser operating systems require a user to enter the correct user name
and password before accessing the data, information, and programs stored on a
computer or network.
Many other systems that maintain financial, personal, and other confidential
information also require a user name and password as part of their logon
procedure.
Some systems assign the user names and even passwords to their users, but
some systems allow their users to choose their own user names and passwords.
c) ___________________
Many networks have audit controls to track which programs and servers were
used, which files opened, and so on. This creates a record of how a transaction
was handled from input through processing and output.
Page 2 of 5 K Aquilina
Student Notes Theory
Page 3 of 5 K Aquilina
Student Notes Theory
Software Piracy
According to estimates by the U.S. Software
and Information Industry Association, as much
as $7.5 billion of American software may be
illegally copied and distributed annually
worldwide. These copies work as well as the
originals, and sell for significantly less money.
Piracy is relatively easy, and only the largest
rings of distributors are usually caught.
Moreover, software pirates know that they are
unlikely to serve hard jail time when prisons are
overcrowded with people convicted of more
serious crimes.
Page 4 of 5 K Aquilina
Student Notes Theory
Backup
A backup is a duplicate of a file, program, or disk that can be used if the original
is lost, damaged, or destroyed.
Files can be restored by copying the backed up files to their original location
on the computer.
Why backup?
• The disk drive you use for backups fails for mechanical reasons.
• Your computer is stolen - laptops are particularly vulnerable.
• Your computer is destroyed by fire, floods or other disasters.
• A power surge fries your machine.
• An employee accidentally or intentionally erases key data.
• A virus infects your system.
• Your hard drive crashes. Sooner or later it will; the only question is when.
W ha t s houl d be B a c k e d U p?
The good news is that you don't need to make copies of all the files on your hard
drive. These days, that could entail many gigabytes of data. You only have to
back up your own data files, such as word processing documents, spreadsheets,
e-mail, digital photos, graphics, etc. Basically, any files you've created or that
were sent to you. You probably already have copies on CD-ROMs of your
program files--Microsoft Office applications, web browsers, plug-ins and such. In
the event that your computer crashes, you can use those to restore the programs
or you can download replacement programs from the Net. So if we are using a
desktop computer system we can use a CD-ROM to make a backup. But a
mainframe computer system of a bank must use another type of storage media
i.e. a tape for backup.
Page 5 of 5 K Aquilina