Security of Data and Information
Security of most resources is about guarding against theft or destruction. Techniques are used to protect data and information, however most data and information can be easily copied or edited without noticeable change to the original. Thus additional measures are required to deal with the security of data and information.
However the larger and greater the information system, security becomes much more crucial in protecting data and information. Possible security issues that all information system designers need to consider include:
However the larger and greater the information system, security becomes much more crucial in protecting data and information. Possible security issues that all information system designers need to consider include:
- Virus attacks - Viruses are software programs that deliberately produce some undesired or unwanted response.
- Hackers- People with extensive technical knowledge and skill who attempt to overcome or get around security mechanisms utilized by a computer system. This provides them with access to view, utilize or even edit data and information.
- Theft- Unauthorized obtaining of data and information onto another system. Also physical theft of hardware and the data and information it contains.
- Unauthorized access by past and present employees- Past and present employees may maliciously tamper with data or they may view and use data of a private nature inappropriately.
- Hardware Faults- Failure of hardware and particular storage devices can result in loss of data.
- Software Faults- Errors in program can cause data to become corrupted. No software is completely free of errors
Strategies commonly used to address the above issues include:
- Passwords- Passwords are used to confirm that a user is who claim they are. Once verified the username is then utilised by the system to grant particular access rights to the user.
- Backup copies- A copy of important files is made on a regular base to ensure that If the original file is lost then the backup can be used. It is important to keep backup copies in a secure location
- Physical barriers- Machines storing important data and information, or performing critical tasks are physically locked away.
- Anti-virus software – All files are scanned to look for possible viruses, then it either removes the virus or quarantines it. Due to the widespread use of networks and in particular the internet, anti-virus software is a virtual necessity.
- Firewalls- A firewall provides protection from outside penetration by hackers. It monitors the transfer of information to and from the network. Most firewalls are utilised as a barrier between a local area network (LAN) and the internet
- Data encryption- Data is encrypted so it is unable to be read by those who do not have access to the decryption code.
- Audit trails- The information system maintains records of all transactions that take place. The aim is to make it possible to trace the origin of any issue that may occur.