0% found this document useful (0 votes)
76 views13 pages

Edpm

The document defines file integrity as a state where no alterations, additions, or deletions have been made to a file, keeping it exactly as originally stored. It also discusses maintaining data accuracy, completeness and consistency. Benefits of file integrity include detecting and distinguishing between high and low risk changes, and determining which changes introduce risk or cause non-compliance. The document also defines file security and discusses advantages like keeping work personal and preventing plagiarism. It outlines various methods to ensure file integrity and security such as overwriting protection, restricted access, virus protection, read-only access, passwords, firewalls, and disaster recovery mechanisms like backup systems.

Uploaded by

Cedri-Ann Brown
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views13 pages

Edpm

The document defines file integrity as a state where no alterations, additions, or deletions have been made to a file, keeping it exactly as originally stored. It also discusses maintaining data accuracy, completeness and consistency. Benefits of file integrity include detecting and distinguishing between high and low risk changes, and determining which changes introduce risk or cause non-compliance. The document also defines file security and discusses advantages like keeping work personal and preventing plagiarism. It outlines various methods to ensure file integrity and security such as overwriting protection, restricted access, virus protection, read-only access, passwords, firewalls, and disaster recovery mechanisms like backup systems.

Uploaded by

Cedri-Ann Brown
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd

Integrity and Security

Definition
 State of a computer(electronic) file in which no
alteration, addition, or deletion has been made,
and which is exactly the way it was stored by
its originator.
 The accuracy, completeness and internal
consistency of the data stored in a file
User Benefits:
The capabilities of true File Integrity :
 Detects changes and determines which changes
introduce risk
 Determines which changes cause non-
compliance
 Distinguishes between high- and low-risk
changes
 Integrates with other security point solutions
 Overwrite protection
This prevents data from being written in an area where data is already stored, thereby
destroying the original data. e.g. floppy disks

 Read-only access
This is where the owner of a file can make only “read – only”

 Restricted access
This is the use of anti-virus protection and read-only access to maintain the file
integrity

 Virus protection
This can be gained through the use of an antivirus program to scan files on access and
remove any threat

 Encryption
This enables the protection of data transmitted “over the wire’ from one location to
another. Encryption is built into software.
Definition
 File security is the protection of personal data and
information by not allowing people to change or
take your files as their own.
 The safeguarding of files against loss, damage,
unwanted modification, or unauthorized access.
Such safeguards may be administrative, physical,
or technical. File security may also be called file
protection.
Advantages of having file security are:
 work remain personal,
 your cannot be plagiarism
 Passwords
 This is the use of a set of characters that may be used to give
access to one or more files
 Firewalls
 This is a program or device that permits an organisation’s internal
computer users to access the external internet but limit ability of
access to internal data files
 Disaster Recovery Mechanisms
 These are implemented to restore a file to its original condition if
a functioning disaster plan is in effect. This involves using backup
systems, periodic comparison with master file and fireproof and
waterproof storage.
 Over right protection
 Restricted Access
 Virus Protection
 Read only Access
 Password
 Firewall
 Back up system

You might also like