Overview of the chapter:
|8.1 Data Privacy||2|
|8.2 Data Security||3|
|8.3 Data Integrity||4|
We value your feedback very much. If you have found anything wrong with the notes, please do shout out in the forum! Your feedback will greatly help us in providing better notes for the CS community.
8.1 Data Privacy
Data Privacy: Keep the data to be available only to authorized users
-> See more in Chapter 9: Ethics
Ways to authenticate the user:
- Biometric Methods
There are also other tips to adhere:
- Never leave computer running while not attended
- Don’t write down details of accessing the computer.
8.2 Data Security
Data Security: A requirement for data to be recoverable if lost or corrupted.
Threats to data security
|1. Hardware Failure||Natural disasters||1. Backup|
* Regular Full backup, kept attest 2 generations
* Regular Incremental backups
* Record system changes during intervals between backups.
2. Alternative system – e.g. RAID
Systems running in parallel.
|2. Unauthorized access||Hacker||1. Encryption to files|
2. Set access levels
e.g. Read only access
|3. Malware||Virus entering the system||1. Firewall|
Examines all data in and out of system.
2. Virus Checker
3. Digital Signiture
8.3 Data Integrity
Data Integrity: A requirement for data to be accurate and up-to-date
Ways ensuring data integrity:
8.3.1 For users:
Checks the format of data entered is correct, that if data matches a certain criteria. Does not confirm content.
Ways of verification:
- Presence Check (Not NULL)
- Format Check (Must DD-MM-YY)
- Length Check (4-digit student num)
- Type Check (int expected)
- Range Check (A1 student num <=5200)
Prevents error when data is copied form one medium to another. Does not confirm content.
Common used method: Double entry, visual double-checks.
8.3.2 During Transmissions:
Make sure that no bit-changes occurred during transmission.
A parity bit is appended at the end to match the protocol, for example:
If agreed on even parity, there should be even number of '1's in a bit. Parity Bit Appended | v 1 1 1 1 0 0 1  Is correctly transmitted. 1 1 1 1 0 0 0  Is incorrectly transmitted, since there is odd (5) number of 1s.
Each bit is regarded as a binary number following a algorithm. The sum of all bits are transmitted with original data.
Same algorithm is run by the receiver. His sum is compared with transmitted sum. If they are no match then there is a data corruption.