0% found this document useful (0 votes)
64 views14 pages

Information Integrity, Privacy and Security

This document contains information about a presentation on information privacy, integrity, and security compiled by Group B of the Department of Computer Science at the Federal University Gusau. It includes an introduction, definitions of information privacy, integrity, and security. It discusses key elements of information privacy and its relation to different data types. It also describes types and classifications of information integrity and differences between information privacy and security. The document contains a table of contents and is presented by a group of 26 students with their names and admission numbers listed.

Uploaded by

Shafeeu Muhammad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views14 pages

Information Integrity, Privacy and Security

This document contains information about a presentation on information privacy, integrity, and security compiled by Group B of the Department of Computer Science at the Federal University Gusau. It includes an introduction, definitions of information privacy, integrity, and security. It discusses key elements of information privacy and its relation to different data types. It also describes types and classifications of information integrity and differences between information privacy and security. The document contains a table of contents and is presented by a group of 26 students with their names and admission numbers listed.

Uploaded by

Shafeeu Muhammad
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 14

FEDERAL UNIVERSITY GUSAU

DEPARTMENT OF COMPUTER SCIENCE

 INFORMATION PRIVACY, INTEGRITY, AND SECURITY


 COMPILED AND PRESENTED BY: GROUP B
S/N NAMES ADM. NO. S/N NAMES ADM. NO.

1. Ayuba Sabiu Jangebe 1710308021 14. Ashafa Aliyu Marafa 1710308036

2. Aisha Suleman 1710308022 15. Mansur Idris 1710308037

3. Shuaib Abdulsamad idowu 1710308023 16. Solomon Abala 1710308038

4. Abdulraheem Hassan Sarkin Pawa 1710308025 17. Mustapha Umar 1710308039

5. Abdulkarim Abdulrahman 1710308026 18. Shafiu Muhammad Maiinjin 1710308040

6. Abdullahi Sadiq 1710308027 19. Sanusi Ahmad 1820308003

7. Habib Salisu 1710308028 20. Imrana Yakubu Jabaka 1820308004

8. Umar Abbas 1710308030 21. Asma’u Lawal Rilwan 1410308010

9. Ikira Hussaini 1710308031 22. Tijjani Abdullahi Ibrahim 1510308009

10. Mubarak Rabiu 1710308032 23. Aisha Suleiman Obadaki 1610308085

11. Nafiu Mohammed 1710308033 24. Anayo Benedict 1610308038

12. Abubakar Nagwandu 1710308034 25. Abdulaziz Umar Kaura 1820308010

13. Ahmad Tijjani 1710308035 26. Abdullahi Armayau 1720308005


TABLE OF CONTENTS
 INTRODUCTION
 MEANING OF INFORMATION PRIVACY AND ITS KEY ELEMENTS
 INFORMATION PRIVACY RELATION TO DIFFFERENT DATA TYPES
 MEANING OF INFORMATION INTEGRITY
 TYPES OF INFORMATION INTEGRITY
 CLASSIFICATION OF INFORMATION INTEGRITY
 MEANING OF INFORMATION SECURITY AND INFORMATION
SECURITY PRINCIPLES
 INFORMATION SECURITY MEASURES AND INFORMATION
SECURITY VS. INFORMATION INTEGRITY
 THE DIFFERENCES BETWEEN INFORMATION PRIVACY AND
INFORMATION SECURITY
 CONCLUSION
 REFERRENCES
INTRODUCTION
 In our society we simultaneously seek privacy and Integrity while having to disclose
personal information in order to receive services and establish friendships. Online
communication and the Social Web, have led us into the habit of sharing large amounts of
information with a great number of people, yet many do not feel threatened when
doing so, at least People should consider Security in their daily Activities.
 The same technology that makes it easy to share personal details has also led to what
refers to as greased information – data that moves
like lightening and is difficult to hold on to.
 Once information is captured electronically for whatever purpose, it is
greased and ready to go for any purpose.
As a consequence, the safety of our personal information has become of great
importance and a major
topic of interest to the business and IT sectors
INFORMATION PRIVACY
 Information privacy is a part of the information protection area that deals with the
proper handling of information with the focus on compliance with information
protection regulations. Also
 Information Privacy is not just about the proper handling of data but also about the
public expectation of privacy, centering around the individual as a key figure.
 Information Privacy creates a Data Protection area with protected usable data as an
output.
 Information privacy may be applied in numerous ways, including encryption,
authentication and data masking - each attempting to ensure that information is
available only to those with authorized access. These protective measures are geared
toward preventing data mining and the unauthorized use of personal information,
which are illegal in many parts of the world.

Key Elements Of Information Privacy


 Right of an individual to be left alone and have control over their personal data
 Procedure for proper handling , processing ,collecting and sharing of personal data.
 Compliance with data protection laws.
INFORMATION PRIVACY RELATION TO DIFFFERENT
DATA TYPES

Information privacy relates to different data types, including:


o Internet privacy (online privacy): All personal data shared over the Internet is
subject to privacy issues. Most websites publish a privacy policy that details the
website's intended use of collected online and/or offline collected data.
o Financial privacy: Financial information is particularly sensitive, as it may easily
be used to commit online and/or offline fraud.
o Medical privacy: All medical records are subject to stringent laws that address
user access privileges. By law, security and authentication systems are often
required for individuals that process and store medical records.
MEANING OF INFORMATION INTEGRITY

 Information integrity refers to the accuracy and consistency (validity) of data over its
lifecycle.
 Information integrity refers to the accuracy and consistency of Information over its
lifecycle. Compromised data, after all, is of little use to enterprises, not to mention
the dangers presented by sensitive data loss. For this reason, maintaining Information
integrity is a core focus of many enterprise security solutions.
 Information Integrity can be defined as the dependability and trustworthiness of
information. More specifically, it is the accuracy, consistency and reliability of the
information content, processes and systems
TYPES OF INFORMATION INTEGRITY
THERE ARE FOUR TYPES OF INFORMATION INTEGRITY
 Entity Integrity: In a database, there are columns, rows, and tables. In a primary key,
these elements are to be as numerous as needed for the Information to be accurate, yet
no more than necessary. None of these elements should be the same and none of these
elements should be null. For example, a database of employees should have primary key
data of their name and a specific “employee number.”
 Referential Integrity: Foreign keys in a database is a second table that can refer to a
primary key table within the database. Foreign keys relate data that could be shared or
null. For instance, employees could share the same role or work in the same department.
 Domain Integrity: All categories and values in a database are set, including nulls (e.g.,
N/A). The domain integrity of a database refers to the common ways to input and read this
data. For instance, if a database uses monetary values to include dollars and cents, three
decimal places will not be allowed.
 User-Defined Integrity: There are sets of data, created by users, outside of entity,
referential and domain integrity. If an employer creates a column to input corrective
action of employees, this data would be classified as “user-defined”.
CLASSIFICATION OF INFORMATION INTEGRITY

Physical integrity
 Physical integrity deals with challenges which are associated with correctly storing and fetching the data itself. Challenges
with physical integrity may include electromechanical faults, design flaws, material fatigue, corrosion, power outages,
natural disasters, and other special environmental hazards such as ionizing radiation, extreme temperatures, pressures
and g-forces. Ensuring physical integrity includes methods such as redundant hardware, an uninterruptible power supply,
certain types of RAID arrays, radiation hardened chips, error-correcting memory, use of a clustered file system, using file
systems that employ block level checksums such as ZFS, storage arrays that compute parity calculations such as exclusive
or use a cryptographic hash function and even having a watchdog timer on critical subsystems.
 Physical integrity often makes extensive use of error detecting algorithms known as error-correcting codes. Human-induced
data integrity errors are often detected through the use of simpler checks and algorithms, such as the Damm
algorithm or Luhn algorithm. These are used to maintain data integrity after manual transcription from one computer
system to another by a human intermediary (e.g. credit card or bank routing numbers). Computer-induced transcription
errors can be detected through hash functions.

Logical integrity
 This type of integrity is concerned with the correctness or rationality of a piece of data, given a particular context. This
includes topics such as referential integrity and entity integrity in a relational database or correctly ignoring impossible
sensor data in robotic systems. These concerns involve ensuring that the data "makes sense" given its environment.
Challenges include software bugs, design flaws, and human errors. Common methods of ensuring logical integrity include
things such as check constraints, foreign key constraints, program assertions, and other run-time sanity checks.
 Both physical and logical integrity often share many common challenges such as human errors and design flaws, and both
must appropriately deal with concurrent requests to record and retrieve data, the latter of which is entirely a subject on
its own.
 If a data sector only has a logical error, it can be reused by overwriting it with new data. In case of a physical error, the
affected data sector is permanently unuseable.
MEANING OF INFORMATION SECURITY

 Information security, sometimes abbreviated to infosec, is a set of practices intended to keep data secure from
unauthorized access or alterations, both when it's being stored and when it's being transmitted from one
machine or physical location to another. You might sometimes see it referred to as data security. As knowledge
has become one of the 21st century's most important assets, efforts to keep information secure have
correspondingly become increasingly important.

INFORMATION SECURITY PRINCIPLES


The basic components of information security are most often summed up by the so-called CIA
triad: confidentiality, integrity, and availability.
 Confidentiality Information is confidential when only those people who are authorized to access it can do so;
to ensure confidentiality, you need to be able to identify who is trying to access data and block attempts by
those without authorization. Passwords, encryption, authentication, and defense against penetration attacks
are all techniques designed to ensure confidentiality.
 Integrity means maintaining in its correct state and preventing it from being improperly modified, either by
accident or maliciously. there are other tools that help provide a defense of integrity in depth: checksums can
help you verify data integrity, for instance, a version control software and frequent backups can help you
restore data to a correct state if need be.
 Availability is the mirror image of confidentiality: while you need to make sure that your data can't be
accessed by unauthorized users, you also need to ensure that it can be accessed by those who have the proper
permissions. Ensuring data availability means matching network and computing resources to the volume of data
access you expect and implementing a good backup policy for disaster recovery purposes.
 In an ideal world, your data should always be kept confidential, in its correct state, and available; in practice.
INFORMATION SECURITY MEASURES

 As should be clear by now, just about all the technical measures associated with cybersecurity touch on
information security to a certain degree, but there it is worthwhile to think about infosec measures in a big-
picture way:
 Technical measures include the hardware and software that protects data — everything from encryption to
firewalls
 Organizational measures include the creation of an internal unit dedicated to information security, along with
making infosec part of the duties of some staff in every department
 Human measures include providing awareness training for users on proper infosec practices
 Physical measures include controlling access to the office locations and, especially, data centers.

INFORMATION SECURITY VS. INFORMATION INTEGRITY


 Information integrity and Information security are related terms, each playing an important role in the successful
achievement of the other.
 Information integrity is a desired result of Information security, but the term Information integrity refers only to
the validity and accuracy of data rather than the act of protecting data. Information security, in other words, is
one of several measures which can be employed to maintain Information integrity. Whether it's a case of
malicious intent or accidental compromise, data security plays an important role in maintaining data integrity.
 For modern enterprises, Information integrity is essential for the accuracy and efficiency of business processes as
well as decision making. It’s also a central focus of many data security programs. Achieved through a variety of
data protection methods, including backup and replication, database integrity constraints, validation processes,
and other systems and protocols, Information integrity is critical yet manageable for organizations today.
THE DIFFERENCES BETWEEN INFORMATION PRIVACY AND INFORMATION
SECURITY

 Information Privacy Compliance with data protection laws and regulation focus on how to
collect, process, share archive and delete the data.
 Information security Measure taken by an organisation is taking in order to prevent any third
party from unauthorized access. Example of this:
Data encryption: This simply means conversion of data from readable format to encoded
format that can be read if only it is decoded.
Hashing: is a process of converting a given key into another value and so on...
To properly protect data and comply with data protecting laws , you need both data
privacy and data security.
CONCLUSION
 Privacy is not merely something to be traded upon, as if the data about us were currency
and nothing else. It’s an emergent social property, relating to values, culture, power, social
standing, dignity, and liberty. This report began from the perspective that people are more
than the data they shed and volunteer. We are citizens, not mere physical masses of data
for harvesting, Privacy is far more than a consideration of individualistic, personal harms—it
is an essential element of a healthy, democratic society. Safeguarding it as technology
progresses is both a personal and social interest.
REFERRENCES
 https://www.techopedia.com/definition/10380/information-privacy
 https://en.wikipedia.org/wiki/Data_integrity
 https://www.csoonline.com/article/3513899/what-is-information-security-definition-
principles-and-jobs.html
  Vijayan Prabhakaran (2006). "IRON FILE SYSTEMS"
(http://pages.cs.wisc.edu/~vijayan/vijayan-thesis.pdf) (PDF). Doctor of Philosophy in
Computer Sciences. University of Wisconsin-Madison. Retrieved 9 June 2012.
 Parity Lost and Parity Regained (http://www.cs.wisc.edu/adsl/Publications/parity-
fast08.html).An Analysis of Data Corruption in the Storage Stack
(http://www.cs.wisc.edu/adsl/Publications/corruption-fast08.pdf) (PDF).
 Impact of Disk Corruption on Open-Source DBMS
(http://www.cs.wisc.edu/adsl/Publications/corrupt-mysql-icde10.pdf) (PDF).

You might also like