Chapter 9 - Notes
Chapter 9 - Notes
DATA INTEGRITY
Data integrity means that data stored should be up-to-date, accurate and consistent.
The overall intent of any data integrity is to ensure, that data is recorded exactly as
intended and upon later retrieval, to ensure, that data is the same as it was when it was
originally recorded. Data integrity aims to prevent the intentional/unintentional
changes to information.
Few Examples:
1. Integrity is violated when an employee accidentally or with malicious intent
deletes/changes important data files.
2. Power outages that affect servers that host critical applications.
3. Human errors while entering information in the system (e.g mistyping the
address, age etc)
4. In the healthcare, keeping data integrity for patient records is vital for proper
diagnosis and treatment. For example, medical professionals rely on accurate
electronic health records to access patients’ medical history or allergies.
Discrepancies or errors can lead to incorrect treatments or prescriptions with
potentially life-threatening consequences.
5. Educational institutions require accurate student records for various purposes
such as enrolment management and academic progress tracking.
In all the above cases integrity of the data is compromised.
DATA PRIVACY
Data privacy is about keeping the data private rather than allowing it to be accessed
by public without consent. It is used to prevent the disclosure of information to
unauthorized individuals or systems.
Few Examples:
1. Credit card transaction on any online shopping app requires the credit card
number to be transmitted from the buyer to the merchant and from the
Merchant to a transaction processing network. The system attempts to enforce
confidentiality by encrypting the card number during transmission, by limiting
the places where it might appear (in databases, log files, backups, printed
5. Digital signature
Digital signatures can be used to secure data by verifying the authenticity and integrity
of digital documents, messages, and software. They are a digital equivalent of a
handwritten signature and are considered legally binding in many countries. It is
basically a way to ensure that an electronic document (e-mail, spreadsheet, text file,
etc.) is authentic. Authentic means that you know who created the document and you
know that it has not been altered in any way since that person created it.
Digital signatures rely on certain types of encryption to ensure authentication.
Encryption is the process of taking all the data that one computer is sending to another
computer in encoded form that only the other computer will be able to decode.
Authentication is the process of verifying that information is coming from a trusted
source. These two processes work hand in hand for digital signatures.
6. Antivirus software and Intrusion Detection System
Antivirus and intrusion detection systems (IDS) are both important tools for protecting
your network and devices from threats:
Antivirus - Prevents, scans, detects, and removes viruses from your computer. Most
antivirus software runs automatically in the background to provide real-time
protection.
Intrusion Detection System - Monitors network traffic and devices for suspicious
activity, security policy violations, or known malicious activity. IDSs can help detect
threats like malware, unauthorized access attempts, and unusual traffic patterns.
Security measures designed to protect the security of data
Data Backup: Data protection is crucial for protecting your business's continuity. If
your only data backup is on a computer and the hard disk crashes or is damaged by a
power surge, your business’s data is gone. The data can be lost due to corruption of
the disk or even accidental erase/overwriting of the file.
For adequate data protection, you need to establish a data backup system.
1) a full backup is made at regular intervals (weekly backup) on a reliable media.
2) at least two generations of full back up are kept
3) incremental backups on daily basis
VERIFICATION
It is used to check whether the data entered is accurate and according to a predefined
criteria. It is used to check that the data has been copied correctly from the source
which might be a hard copy document or another computer.
Methods of Data Verification:
1. Double Entry
• The data is entered 2 times and then compared to see if any error is made.
2. Visual Check
• The data entered is compared to the hard copy.
3. Check Digit
• It is an additional digit added to the right of a barcode or ISBN number.
• It is used to check whether for example the barcode is correctly input.
• It can catch incorrect digits being entered, missing digits, phonetic errors
(typing 12 instead of 20), swapping of 2 numbers w/ each other.
4. Checksum
• It is used to check if data has been changed or corrupted during data
transmission.
• Data is sent in blocks and an additional value is sent at the end of the block
of data.
5. Parity Check
• It is used to check if data has been changed or corrupted during data
transmission.
• There are 2 types: Odd parity (contains odd # of 1s) Even parity (contains
even # of 1s).
6. Automatic Repeat Request (ARQ)
• It is used to check data following its transmission.
• It consists of an acknowledgement and a timeout.
• If an error is detected or a timeout occurs, a package of data is re-requested.
****************