Top Banner
Security and Integrity of Data Group Members Adeel Riaz Mirza Danish Baig Mirza Ibad Baig Advisor: Sir Amir Saifi PAF KIET Fall 11
23

Security and Integrity of Data

Jul 15, 2015

Download

Data & Analytics

Adeel Riaz
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security and Integrity of Data

Security and Integrity of Data

Group Members

Adeel Riaz

Mirza Danish Baig

Mirza Ibad Baig

Advisor: Sir Amir Saifi

PAF KIET Fall 11

Page 2: Security and Integrity of Data

Data Integrity

Refers to the validity of data. Integrity ensure that the

data stored on devices is correct and no unauthorized

persons or malicious software has altered data. Data

integrity can be compromised in a number of ways:

• Human errors when data is entered.

• Errors that occur when data is transmitted from one

computer to another.

• Software bugs or viruses.

• Hardware malfunctions, such as disk crashes.

• Natural disasters, such as fires and floods.

Page 3: Security and Integrity of Data

Example of Data Integrity

Page 4: Security and Integrity of Data

Minimize Threats to Data Integrity

There are many ways to minimize these threats to data

integrity. these include:

1. Backing up data regularly

2. Controlling access to data via security mechanisms

3. Designing user interfaces that prevent the input of

invalid data

4. Using error detection and correction software when

transmitting data

Page 5: Security and Integrity of Data

Your work is lost if

you don't have a

back- up copy.

1- Backing up data regularly

Back up your critical data to an

external medium. Some popular

options are CDs, USB Flash drives

Page 6: Security and Integrity of Data

2- Controlling access to data via security

mechanisms

Organization must

implement physical

security mechanisms to

maintain the data

integrity.

Page 7: Security and Integrity of Data

3-Designing UI that prevent the input of invalid data

Page 8: Security and Integrity of Data

4- Use error detection and correction software

In communications, error detection refers to a class of

techniques for detecting garbled messages.The

simplest and most common techniques are

called Checksum.

•Checksum

Page 9: Security and Integrity of Data

How do I secure my Windows PC?

Operating System

Updates Antivirus ProtectionUse a Firewall

Page 10: Security and Integrity of Data

What is difference between Data Integrity and Data Security?

Data Integrity:

• Making sure the data is correct and not corrupt.

Data Security:

• Making sure only the people who should have access

to the data are the only ones who can access the data.

also, keeping straight who can read the data and who

can write data.

Page 11: Security and Integrity of Data

Data Integrity Types in Database

Unique Column Values

Primary Key Values

Referential Integrity Rule

Complex Integrity Checking

Page 12: Security and Integrity of Data

Null Integrity Constraint

By default, all columns in a table allow nulls. Null means

the absence of a value. A NOT NULL constraint requires a

column of a table contain no null values.

Page 13: Security and Integrity of Data

UNIQUE Key Integrity

A UNIQUE key integrity constraint requires that every

value in a column or set of columns (key) be unique.

Page 14: Security and Integrity of Data

Primary Key Constraint

Primary key is used to uniquely identify each row in a

table. PK cannot be null

Page 15: Security and Integrity of Data

Referential Integrity Constraint

The following terms are associated with referential

integrity constraints.

**Foreign Key **Dependent/Child Table

Page 16: Security and Integrity of Data

Complex Integrity Checking

This type of foreign key references a parent key in

the same table.

Page 17: Security and Integrity of Data

More on integrity. . .

• Enforcing business rules in the code of a database

application

• Using stored procedures to completely control access

to data

• Enforcing business rules with triggered stored

database procedures

Page 18: Security and Integrity of Data

Data Security

Page 19: Security and Integrity of Data

Possible Risks

Risk are involved:

– Lost

– Destroyed

– Corrupted

– Modified

– Disclosed

Page 20: Security and Integrity of Data

Possible Threads

1) Hacking

“Use of a computer system without a specific,

constructive purpose, or without proper

authorization”

2) Virus

“A computer program that is designed to

replicate itself by copying itself into the other

programs stored in a computer.”

(source: www.answer.com)

Page 21: Security and Integrity of Data

Data Protection

1) Backup

“Backup in simple terms is an additional copy of all

your important work on additional storage media

like CD, DVD, Portable Hard disk, USB Flash

drive or anything similar to that.

Page 22: Security and Integrity of Data

Physical Protection of Data

1) Proper Monitoring System

2) Fireproof rooms

3) Can't Access Unauthorized Peoples

4) Proper Identification of Relevant Peoples

Page 23: Security and Integrity of Data

Other Ways of Protection of Data

1) User Identity and Password

2) Write protected

3) Password Protected Files

4) Data Encryption