0% found this document useful (0 votes)
40 views7 pages

O2 Chapter 8

Data integrity and security are critical aspects of any system that stores, processes, or retrieves data. Data may become compromised if it is lost, damaged, corrupted, deleted, overwritten, hacked, or destroyed by various threats. To protect data, organizations should implement regular backups stored securely offline, use anti-virus software, enforce strong passwords, securely store important files, control physical access to computer systems, log off when away, enable write protections, and consider encryption. Role-based access controls with passwords can restrict what information different user types are able to access.

Uploaded by

Sam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views7 pages

O2 Chapter 8

Data integrity and security are critical aspects of any system that stores, processes, or retrieves data. Data may become compromised if it is lost, damaged, corrupted, deleted, overwritten, hacked, or destroyed by various threats. To protect data, organizations should implement regular backups stored securely offline, use anti-virus software, enforce strong passwords, securely store important files, control physical access to computer systems, log off when away, enable write protections, and consider encryption. Role-based access controls with passwords can restrict what information different user types are able to access.

Uploaded by

Sam
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 7

Chapter 8

Security and computer ethics


What is data integrity(correctness)
• Data integrity refers to maintaining and assuring the accuracy and
consistency of data over its entire life-cycle
• It is a critical aspect to the design, implementation and usage of any
system which stores, processes, or retrieves data
• Data security is about keeping data safe. Many individuals, small
businesses and major companies rely heavily on their computer
systems.
• If the data on these computer systems is damaged, lost, or stolen, it
can lead to disaster
Key threats to data security

• Data may get:


 lost or damaged during a system crash - especially one affecting the hard disk
 corrupted as a result of faulty disks, disk drives, or power failures
 lost by accidentally deleting or overwriting files
 lost or become corrupted by computer viruses
 hacked into by unauthorised users and deleted or altered
 destroyed by natural disasters, acts of terrorism, or war
 deleted or altered by employees wishing to make money or take revenge from
employees
Keeping data secure

Measures that can be taken to keep data secure include:


 making regular backups of files (backup copies should be stored in fireproof safes
or in another building)
 protecting yourself against viruses by running anti-virus software
 using a system of passwords so that access to data is restricted
 safe storage of important files stored on removable disks, e.g. locked away in a
fireproof and waterproof safe
 allowing only authorised staff into certain computer areas, e.g. by controlling entry
to these areas by means of ID cards or magnetic swipe cards
 always logging off or turning terminals off and if possible locking them
 avoiding accidental deletion of files by write-protecting disks
 using data encryption techniques to code data so that it makes no apparent sense
Question 1
In a local doctor's surgery, data about the patients is stored in a database on a
computer.
Consider two physical precautions that should be taken to keep the data secure.
Answer
1. keep the computer area secure
2. keep backups in a safe place

The key word is physical - the question is asking for the physical precautions you can
take to protect data. Keeping the computer area secure and keeping backups in a safe
place are both physical precautions. Swipe card entry, locking terminals or controlling
access to computer areas would also have been good answers.
Question 2
• The doctor needs to see all the information about patients. The receptionist only needs
• to see some of the information.
• Describe one way in which software could restrict access to patient information.
Answer
• Make it so users must enter a password to gain access to certain areas of the database.

• Examiner's comment
• The question is looking for detail about different types of access for different users. This
• answer clearly highlights the need for having passwords for different levels of access.

You might also like