Data security
- Involves keeping data safe. In computer system people have found ways in which data can be misused/exploited for various reasons. To prevent these misuses of data measure were establish to protect data. These measures are being establish through a variety of ways.
- Software restrictions
- Physical restrictions
- Software restriction
- Software restrictions can create barriers to data corruption, restrict access to software that may contain sensitive data, or to software that can cause damage.
- Passwords - A password is a combination of characters that must be entered before you can access, view or edit. This is use to prevent unauthorized person from accessing data.
- Encryption - Data is coded by the sender in a particular way according to a key and decoded by the appropriate receive by the same key. Encryption is used to prevent hijacking of data during the process of being send from sender to receiver. Other examples may apply.
- Firewall - A software that defends a computer system from unauthorized remote access from hackers.
- Virus protection - A virus is a piece of software intended to cause harm to a computer or gain access to confidential data. Software that offers virus protection are called antivirus software.
- Physical restrictions
- A computer is a physical object that can create physical output, so there are physical ways to protect data. There are many physical restrictions such as:
- Backup and recovery procedures - Backing up data allows one to have a secondary copy thus having a backup in-case of data lost or corruption.
- Archiving - Backing up and saving secondary data for old data such as a physical copy in file cabinets of legal or financial documents.
- Biometric systems - Biometric system uses a scanner in cooperation with a body part. For example fingerprint scanner and retinal scanner use to gain access to rooms.
- Locks and guards - Computers and peripherals, such as keyboards and monitors, are easily stolen. here are some ways to make them harder to steal:
- Many laptop computers have slots that allow you to attach a lock that is chained to a desk.
- In an office or even a home, locking windows and doors and securing the premises with an alarm system can help prevent theft of computer equipment
- A business may employ a security guard to help prevent theft.
- Physical data, such as documents, can be locked away in a safe or a lock drawer to prevent theft.
- Fireproof and waterproof cabinets - A fireproof/waterproof cabinet can be used to protect computers, servers and data backups from fire and/or flooding.
- Good maintenance of computers - Involves establishing proper protection from dust electrical spike and dips and power lost.
- Software rights
- There are two types of software rights:
- Proprietary software
- Open source software
- The difference are proprietary software is a software that is sold at a price, prohibiting you the right to copy, change or resell it. These software usually sells what is called licenses key. While, open source software is a software that is free to the public and its users are allowed to make further improvements.
Misuse of Data
- Today we can use technology to produce and share information but unfortunately, that also means that some people can misuse the technology for unpleasant purposes. Some ways in which data be misused are:
- Surveillance - Using hidden microphones and/or cameras to gain unauthorized information from conversation.
- Electronic eavesdropping - Intercepting email and/or messages during the process of reaching it's designated receiver.
- Propaganda - Is information distributed to encourage or force a particular opinion on a particular entity.
- Inaccurate information - Entering and storing of inaccurate information due to human error or deliberately altering correct information.
Computer crimes
- Technology was greatly advance human being and human have being trusted technology to secure there most vital and personal information. Here are some computer crimes:
- Industrial espionage
- Software piracy
- Computer fraud
- Credit card fraud
- Identify theft