Professional Documents
Culture Documents
1.6 Security, Privacy And: Data Integrity
1.6 Security, Privacy And: Data Integrity
Administrator Normal
❖ These accounts are special ❖ These accounts are the basic
accounts that are used for accounts that one uses for
making changes to system normal everyday tasks.
settings or managing other ❖ As a standard user, one can do
people’s accounts. just about anything one would
❖ They have full access to every need to do, such as running
setting on the computer. software or personalizing your
❖ Every computer will have at desktop.
least one administrator
account and the owner should
already have the password to
this account.
1.2 Firewalls
◎ A firewall is a network security device controlled by its
software counterpart that grants or rejects network access to
traffic flows between an untrusted zone (e.g., the Internet)
and a trusted zone (e.g., a private or corporate network).
◎ The firewall acts as the demarcation point or “traffic cop” in
the network, as all communication should flow through it
and it is where traffic is granted or rejected access.
◎ Firewalls enforce access controls through a positive control
model, which states that only traffic defined in the firewall
policy is allowed onto the network; all other traffic is denied
(known as “default deny”).
1.3 General Authentication Techniques
◎ Using password
◎ Using digital signature
Authentication
Errors Solutions
◎ Errors on input: when data is ◎ Being focused while entering
keyed wrongly, a batch of data the data.
could be lost or accidently ◎ Use of backup software.
entered twice. ◎ Uses of effective gateways
◎ Program errors
◎ Files infected by viruses
◎ Transmission errors: due to
interference in communication
links.
1.6.2 Data integrity
◎ Computer integrity is a quality of data, which guarantees the data is complete,
consistent, reliable and has a whole structure.
◎ Data integrity is preserved only if and when the data is satisfying all the rules.
These rules might be how each piece of data is related to each other, validity of
dates, linkage, etc.
◎ If data integrity is preserved, the data can be considered consistent and can be
given the assurance to be certified.
1
Data Validation
Validation
Any questions?