security and integrity of data
TRANSCRIPT
Security and Integrity of Data
Group Members
Adeel Riaz
Mirza Danish Baig
Mirza Ibad Baig
Advisor: Sir Amir Saifi
PAF KIET Fall 11
Data Integrity
Refers to the validity of data. Integrity ensure that the
data stored on devices is correct and no unauthorized
persons or malicious software has altered data. Data
integrity can be compromised in a number of ways:
• Human errors when data is entered.
• Errors that occur when data is transmitted from one
computer to another.
• Software bugs or viruses.
• Hardware malfunctions, such as disk crashes.
• Natural disasters, such as fires and floods.
Minimize Threats to Data Integrity
There are many ways to minimize these threats to data
integrity. these include:
1. Backing up data regularly
2. Controlling access to data via security mechanisms
3. Designing user interfaces that prevent the input of
invalid data
4. Using error detection and correction software when
transmitting data
Your work is lost if
you don't have a
back- up copy.
1- Backing up data regularly
Back up your critical data to an
external medium. Some popular
options are CDs, USB Flash drives
2- Controlling access to data via security
mechanisms
Organization must
implement physical
security mechanisms to
maintain the data
integrity.
4- Use error detection and correction software
In communications, error detection refers to a class of
techniques for detecting garbled messages.The
simplest and most common techniques are
called Checksum.
•Checksum
What is difference between Data Integrity and Data Security?
Data Integrity:
• Making sure the data is correct and not corrupt.
Data Security:
• Making sure only the people who should have access
to the data are the only ones who can access the data.
also, keeping straight who can read the data and who
can write data.
Data Integrity Types in Database
Unique Column Values
Primary Key Values
Referential Integrity Rule
Complex Integrity Checking
Null Integrity Constraint
By default, all columns in a table allow nulls. Null means
the absence of a value. A NOT NULL constraint requires a
column of a table contain no null values.
UNIQUE Key Integrity
A UNIQUE key integrity constraint requires that every
value in a column or set of columns (key) be unique.
Primary Key Constraint
Primary key is used to uniquely identify each row in a
table. PK cannot be null
Referential Integrity Constraint
The following terms are associated with referential
integrity constraints.
**Foreign Key **Dependent/Child Table
More on integrity. . .
• Enforcing business rules in the code of a database
application
• Using stored procedures to completely control access
to data
• Enforcing business rules with triggered stored
database procedures
Possible Threads
1) Hacking
“Use of a computer system without a specific,
constructive purpose, or without proper
authorization”
2) Virus
“A computer program that is designed to
replicate itself by copying itself into the other
programs stored in a computer.”
(source: www.answer.com)
Data Protection
1) Backup
“Backup in simple terms is an additional copy of all
your important work on additional storage media
like CD, DVD, Portable Hard disk, USB Flash
drive or anything similar to that.
Physical Protection of Data
1) Proper Monitoring System
2) Fireproof rooms
3) Can't Access Unauthorized Peoples
4) Proper Identification of Relevant Peoples