Preview

Data Security and Integrity: Software and Physical Restrictions

Good Essays
Open Document
Open Document
1277 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Security and Integrity: Software and Physical Restrictions
Table of Contents

Page # Introduction ………………………………………..................................... 3

Maintenance of data security and integrity in reference to: * Software Access Restrictions ………………………………..... 4-5

* Physical Access Restrictions ………………………………….. 6-7

Summary ………………………………………………………………... 8

Bibliography …………………………………………………………….. 9

Introduction

Maintenance of data security and integrity in reference to:
Software Access Restrictions

These are inserted for the purposes of protecting computer software. A few forms of software access restrictions are as follows:

* Passwords

Definition:
-A string of characters that allows access to a computer, interface or system.

How does it assist in securing data and maintaining its integrity?
When a person creates a password for access to a computer, folder, program etc. they are creating a code that must be implemented every time they wish to access the software. This means that if any unknown or unauthorized personnel were to attempt to view the material and were unaware of the password then they would be unable to do so, thus securing the data.
The integrity of the data is also highly protected when using a password because if any unknown or unauthorized personnel attempt to access any data that is password protected without knowing the password, they will be denied access. Thus the data cannot be altered in any way and its trustworthiness would remain the same.

* Data Encryption

Definition:
-This is the encryption (encoding) of data for security purposes.

How does it assist in securing data and maintaining its integrity?
By encrypting, we change the original plaintext version of data into ciphertext, which is an unreadable format that will protect against unauthorized parties. Only those who possess the key to trigger the algorithm that will decrypt the data, hence making it readable, can access it. A higher bit



Bibliography:

You May Also Find These Documents Helpful