Page # Introduction ………………………………………..................................... 3
Maintenance of data security and integrity in reference to: * Software Access Restrictions ………………………………..... 4-5
* Physical Access Restrictions ………………………………….. 6-7
Summary ………………………………………………………………... 8
Bibliography …………………………………………………………….. 9
Introduction
Maintenance of data security and integrity in reference to:
Software Access Restrictions
These are inserted for the purposes of protecting computer software. A few forms of software access restrictions are as follows:
* Passwords
Definition:
-A string of characters that allows access to a computer, interface or system.
How does it assist in securing data and maintaining its integrity?
When a person creates a password for access to a computer, folder, program etc. they are creating a code that must be implemented every time they wish to access the software. This means that if any unknown or unauthorized personnel were to attempt to view the material and were unaware of the password then they would be unable to do so, thus securing the data.
The integrity of the data is also highly protected when using a password because if any unknown or unauthorized personnel attempt to access any data that is password protected without knowing the password, they will be denied access. Thus the data cannot be altered in any way and its trustworthiness would remain the same.
* Data Encryption
Definition:
-This is the encryption (encoding) of data for security purposes.
How does it assist in securing data and maintaining its integrity?
By encrypting, we change the original plaintext version of data into ciphertext, which is an unreadable format that will protect against unauthorized parties. Only those who possess the key to trigger the algorithm that will decrypt the data, hence making it readable, can access it. A higher bit
Bibliography: