Introduction to Information Security



Download 1,39 Mb.
bet16/44
Sana01.04.2022
Hajmi1,39 Mb.
#522548
1   ...   12   13   14   15   16   17   18   19   ...   44
Bog'liq
CSS

Data Integrity

  • When data is processed it is usually changed in some way or another
  • Data integrity describes the correctness of this change
  • Safeguards are needed to make sure that the data has integrity by detecting any mistakes or malicious change to the data

Need of Data Security

  • Many businesses hold very important and confidential data
  • Hence security of data is extremely important
  • Data must be safeguarded all the time

Backups

  • A master file stores the static data (does not change frequently) found on the database
  • The transaction file keeps track of all the changes made to the database throughout the day
  • At the end of the day, all the contents stored in the transaction file are transferred to the master file in order to update it
  • This hierarchy is used for safety

Suppose the last Master File (Son) got corrupted by accidental deletion or corruption of data, the same Master File can be re-created by combining the father Master File with the respective Transaction File to obtain the son file once again.

Physical Security

  • The most obvious choice of protecting data is to keep it in a safe locked room/building
  • Protected rooms can be safeguarded by
  • A lock-and-key
  • ID card scanning
  • Biometrics (retina-scan, fingerprint-scanning)
  • Using a safe
  • Alarm systems

Software Safeguards

  • There are many software measures which can protect data.
  • The following explains some of the most common approaches used now a days

IDS

  • IDS stands for Intrusion Detection System
  • IDS monitors the operation of the network to detect illegal operations
  • The system may be
  • server-based - detecting attacks on the operation of the file-server
  • network based, watching the pattern of traffic across the network

Download 1,39 Mb.

Do'stlaringiz bilan baham:
1   ...   12   13   14   15   16   17   18   19   ...   44




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish