Integrity and Security
Definition
State of a computer(electronic) file in which no
alteration, addition, or deletion has been made,
and which is exactly the way it was stored by
its originator.
The accuracy, completeness and internal
consistency of the data stored in a file
User Benefits:
The capabilities of true File Integrity :
Detects changes and determines which changes
introduce risk
Determines which changes cause non-
compliance
Distinguishes between high- and low-risk
changes
Integrates with other security point solutions
Overwrite protection
This prevents data from being written in an area where data is already stored, thereby
destroying the original data. e.g. floppy disks
Read-only access
This is where the owner of a file can make only “read – only”
Restricted access
This is the use of anti-virus protection and read-only access to maintain the file
integrity
Virus protection
This can be gained through the use of an antivirus program to scan files on access and
remove any threat
Encryption
This enables the protection of data transmitted “over the wire’ from one location to
another. Encryption is built into software.
Definition
File security is the protection of personal data and
information by not allowing people to change or
take your files as their own.
The safeguarding of files against loss, damage,
unwanted modification, or unauthorized access.
Such safeguards may be administrative, physical,
or technical. File security may also be called file
protection.
Advantages of having file security are:
work remain personal,
your cannot be plagiarism
Passwords
This is the use of a set of characters that may be used to give
access to one or more files
Firewalls
This is a program or device that permits an organisation’s internal
computer users to access the external internet but limit ability of
access to internal data files
Disaster Recovery Mechanisms
These are implemented to restore a file to its original condition if
a functioning disaster plan is in effect. This involves using backup
systems, periodic comparison with master file and fireproof and
waterproof storage.
Over right protection
Restricted Access
Virus Protection
Read only Access
Password
Firewall
Back up system