security and integrity of data

23
Security and Integrity of Data Group Members Adeel Riaz Mirza Danish Baig Mirza Ibad Baig Advisor: Sir Amir Saifi PAF KIET Fall 11

Upload: adeel-riaz

Post on 15-Jul-2015

159 views

Category:

Data & Analytics


2 download

TRANSCRIPT

Security and Integrity of Data

Group Members

Adeel Riaz

Mirza Danish Baig

Mirza Ibad Baig

Advisor: Sir Amir Saifi

PAF KIET Fall 11

Data Integrity

Refers to the validity of data. Integrity ensure that the

data stored on devices is correct and no unauthorized

persons or malicious software has altered data. Data

integrity can be compromised in a number of ways:

• Human errors when data is entered.

• Errors that occur when data is transmitted from one

computer to another.

• Software bugs or viruses.

• Hardware malfunctions, such as disk crashes.

• Natural disasters, such as fires and floods.

Example of Data Integrity

Minimize Threats to Data Integrity

There are many ways to minimize these threats to data

integrity. these include:

1. Backing up data regularly

2. Controlling access to data via security mechanisms

3. Designing user interfaces that prevent the input of

invalid data

4. Using error detection and correction software when

transmitting data

Your work is lost if

you don't have a

back- up copy.

1- Backing up data regularly

Back up your critical data to an

external medium. Some popular

options are CDs, USB Flash drives

2- Controlling access to data via security

mechanisms

Organization must

implement physical

security mechanisms to

maintain the data

integrity.

3-Designing UI that prevent the input of invalid data

4- Use error detection and correction software

In communications, error detection refers to a class of

techniques for detecting garbled messages.The

simplest and most common techniques are

called Checksum.

•Checksum

How do I secure my Windows PC?

Operating System

Updates Antivirus ProtectionUse a Firewall

What is difference between Data Integrity and Data Security?

Data Integrity:

• Making sure the data is correct and not corrupt.

Data Security:

• Making sure only the people who should have access

to the data are the only ones who can access the data.

also, keeping straight who can read the data and who

can write data.

Data Integrity Types in Database

Unique Column Values

Primary Key Values

Referential Integrity Rule

Complex Integrity Checking

Null Integrity Constraint

By default, all columns in a table allow nulls. Null means

the absence of a value. A NOT NULL constraint requires a

column of a table contain no null values.

UNIQUE Key Integrity

A UNIQUE key integrity constraint requires that every

value in a column or set of columns (key) be unique.

Primary Key Constraint

Primary key is used to uniquely identify each row in a

table. PK cannot be null

Referential Integrity Constraint

The following terms are associated with referential

integrity constraints.

**Foreign Key **Dependent/Child Table

Complex Integrity Checking

This type of foreign key references a parent key in

the same table.

More on integrity. . .

• Enforcing business rules in the code of a database

application

• Using stored procedures to completely control access

to data

• Enforcing business rules with triggered stored

database procedures

Data Security

Possible Risks

Risk are involved:

– Lost

– Destroyed

– Corrupted

– Modified

– Disclosed

Possible Threads

1) Hacking

“Use of a computer system without a specific,

constructive purpose, or without proper

authorization”

2) Virus

“A computer program that is designed to

replicate itself by copying itself into the other

programs stored in a computer.”

(source: www.answer.com)

Data Protection

1) Backup

“Backup in simple terms is an additional copy of all

your important work on additional storage media

like CD, DVD, Portable Hard disk, USB Flash

drive or anything similar to that.

Physical Protection of Data

1) Proper Monitoring System

2) Fireproof rooms

3) Can't Access Unauthorized Peoples

4) Proper Identification of Relevant Peoples

Other Ways of Protection of Data

1) User Identity and Password

2) Write protected

3) Password Protected Files

4) Data Encryption