Information Integrity, Privacy and Security
Information Integrity, Privacy and Security
Information integrity refers to the accuracy and consistency (validity) of data over its
lifecycle.
Information integrity refers to the accuracy and consistency of Information over its
lifecycle. Compromised data, after all, is of little use to enterprises, not to mention
the dangers presented by sensitive data loss. For this reason, maintaining Information
integrity is a core focus of many enterprise security solutions.
Information Integrity can be defined as the dependability and trustworthiness of
information. More specifically, it is the accuracy, consistency and reliability of the
information content, processes and systems
TYPES OF INFORMATION INTEGRITY
THERE ARE FOUR TYPES OF INFORMATION INTEGRITY
Entity Integrity: In a database, there are columns, rows, and tables. In a primary key,
these elements are to be as numerous as needed for the Information to be accurate, yet
no more than necessary. None of these elements should be the same and none of these
elements should be null. For example, a database of employees should have primary key
data of their name and a specific “employee number.”
Referential Integrity: Foreign keys in a database is a second table that can refer to a
primary key table within the database. Foreign keys relate data that could be shared or
null. For instance, employees could share the same role or work in the same department.
Domain Integrity: All categories and values in a database are set, including nulls (e.g.,
N/A). The domain integrity of a database refers to the common ways to input and read this
data. For instance, if a database uses monetary values to include dollars and cents, three
decimal places will not be allowed.
User-Defined Integrity: There are sets of data, created by users, outside of entity,
referential and domain integrity. If an employer creates a column to input corrective
action of employees, this data would be classified as “user-defined”.
CLASSIFICATION OF INFORMATION INTEGRITY
Physical integrity
Physical integrity deals with challenges which are associated with correctly storing and fetching the data itself. Challenges
with physical integrity may include electromechanical faults, design flaws, material fatigue, corrosion, power outages,
natural disasters, and other special environmental hazards such as ionizing radiation, extreme temperatures, pressures
and g-forces. Ensuring physical integrity includes methods such as redundant hardware, an uninterruptible power supply,
certain types of RAID arrays, radiation hardened chips, error-correcting memory, use of a clustered file system, using file
systems that employ block level checksums such as ZFS, storage arrays that compute parity calculations such as exclusive
or use a cryptographic hash function and even having a watchdog timer on critical subsystems.
Physical integrity often makes extensive use of error detecting algorithms known as error-correcting codes. Human-induced
data integrity errors are often detected through the use of simpler checks and algorithms, such as the Damm
algorithm or Luhn algorithm. These are used to maintain data integrity after manual transcription from one computer
system to another by a human intermediary (e.g. credit card or bank routing numbers). Computer-induced transcription
errors can be detected through hash functions.
Logical integrity
This type of integrity is concerned with the correctness or rationality of a piece of data, given a particular context. This
includes topics such as referential integrity and entity integrity in a relational database or correctly ignoring impossible
sensor data in robotic systems. These concerns involve ensuring that the data "makes sense" given its environment.
Challenges include software bugs, design flaws, and human errors. Common methods of ensuring logical integrity include
things such as check constraints, foreign key constraints, program assertions, and other run-time sanity checks.
Both physical and logical integrity often share many common challenges such as human errors and design flaws, and both
must appropriately deal with concurrent requests to record and retrieve data, the latter of which is entirely a subject on
its own.
If a data sector only has a logical error, it can be reused by overwriting it with new data. In case of a physical error, the
affected data sector is permanently unuseable.
MEANING OF INFORMATION SECURITY
Information security, sometimes abbreviated to infosec, is a set of practices intended to keep data secure from
unauthorized access or alterations, both when it's being stored and when it's being transmitted from one
machine or physical location to another. You might sometimes see it referred to as data security. As knowledge
has become one of the 21st century's most important assets, efforts to keep information secure have
correspondingly become increasingly important.
As should be clear by now, just about all the technical measures associated with cybersecurity touch on
information security to a certain degree, but there it is worthwhile to think about infosec measures in a big-
picture way:
Technical measures include the hardware and software that protects data — everything from encryption to
firewalls
Organizational measures include the creation of an internal unit dedicated to information security, along with
making infosec part of the duties of some staff in every department
Human measures include providing awareness training for users on proper infosec practices
Physical measures include controlling access to the office locations and, especially, data centers.
Information Privacy Compliance with data protection laws and regulation focus on how to
collect, process, share archive and delete the data.
Information security Measure taken by an organisation is taking in order to prevent any third
party from unauthorized access. Example of this:
Data encryption: This simply means conversion of data from readable format to encoded
format that can be read if only it is decoded.
Hashing: is a process of converting a given key into another value and so on...
To properly protect data and comply with data protecting laws , you need both data
privacy and data security.
CONCLUSION
Privacy is not merely something to be traded upon, as if the data about us were currency
and nothing else. It’s an emergent social property, relating to values, culture, power, social
standing, dignity, and liberty. This report began from the perspective that people are more
than the data they shed and volunteer. We are citizens, not mere physical masses of data
for harvesting, Privacy is far more than a consideration of individualistic, personal harms—it
is an essential element of a healthy, democratic society. Safeguarding it as technology
progresses is both a personal and social interest.
REFERRENCES
https://www.techopedia.com/definition/10380/information-privacy
https://en.wikipedia.org/wiki/Data_integrity
https://www.csoonline.com/article/3513899/what-is-information-security-definition-
principles-and-jobs.html
Vijayan Prabhakaran (2006). "IRON FILE SYSTEMS"
(http://pages.cs.wisc.edu/~vijayan/vijayan-thesis.pdf) (PDF). Doctor of Philosophy in
Computer Sciences. University of Wisconsin-Madison. Retrieved 9 June 2012.
Parity Lost and Parity Regained (http://www.cs.wisc.edu/adsl/Publications/parity-
fast08.html).An Analysis of Data Corruption in the Storage Stack
(http://www.cs.wisc.edu/adsl/Publications/corruption-fast08.pdf) (PDF).
Impact of Disk Corruption on Open-Source DBMS
(http://www.cs.wisc.edu/adsl/Publications/corrupt-mysql-icde10.pdf) (PDF).