HTTP://WWW.COMPUTER-WORLD1.COM

Computer World
Computer World
Computer World
Computer World
Computer World
Computer World
Computer World
Computer World
Computer World
Computer World
Computer World
Computer World
Computer World
Computer World
Computer World
Computer World
Computer World
Computer World
Computer World
Computer World
Computer World
Computer World
Computer World
Computer World
Computer World
Computer World
Computer World
Computer World
Computer World
Computer World


The Web Ask
 


 
Computer Information
MENU  
  COMPUTER HELP
  Computing Notes
  => 1 Introduction To Computing
  => 1.1 Computer Hardware
  => 1.2 Computer Software
  => 1.3 The Human-Computer Interface
  => 1.4 Business Information Systems
  => 1.5 Batch Processing
  => 2 Word Processing
  => 2.1 Introduction
  => 2.2 Editing Facilities
  => 2.3 Bullets And Numbering
  => 2.4 Layout Facilities
  => 2.5 Headers And Footers
  => 2.6 Style Controls
  => 2.7 Spelling And Grammar Checking
  => 2.8 Inserting Columns
  => 2.9 Borders And Shading
  => 2.10 Tables
  => 2.11 Inserting Graphics
  => 2.12 Mail Merging
  => 2.13 Macros
  => 3 Programming In QuickBASIC
  => 3.1 Introduction
  => 3.2 Variables, Input And Output
  => 3.3 Arithmetic Operators
  => 3.4 Iteration
  => 3.5 Selection
  => 3.6 Functions
  => 3.7 Subprograms
  => 3.8 Recursion
  => 3.9 Arrays
  => 3.10 Program Structure
  => 3.11 Jackson Structure Diagrams
  => 3.12 String Processing
  => 4 Data Representation
  => 4.1 Different Computer Codes
  => 4.2 Binary Integers
  => 4.3 Higher Number Bases
  => 4.4 Graphics, Sounds And Other Interpretations
  => 4.5 Fixed Point Binary Numbers
  => 4.6 Floating Point Binary Numbers
  => 4.7 Range And Accuracy
  => 5 Spreadsheets
  => 5.1 Introduction
  => 5.2 General Features
  => 5.3 "What If" Calculations
  => 5.4 Changing The Workbook's Appearance
  => 5.5 Relative And Absolute Reference
  => 5.6 Sorting And Filters
  => 5.7 Charts
  => 5.8 Lookup
  => 5.9 The IF Function
  => 5.10 Goal Seeker
  => 5.11 Solver
  => 5.12 Macros
  => 6 Files
  => 6.1 File Concepts
  => 6.2 Serial & Sequential Files
  => 6.3 Indexed Sequential Files
  => 6.4 Random Access Files
  => 6.5 Overview of File Processing
  => 7 Standard Algorithms
  => 7.1 Linear Searches
  => 7.2 Binary Search
  => 7.3 Internal Sorting
  => 7.4 External Sorting
  => 8 Legal Issues And Data Security
  => 8.1 The Computer Missuse Act 1990
  => 8.2 The Data Protection Act 1984
  => 8.3 Computer Fraud
  => 8.4 Software Copyright
  => 8.5 Viruses And Trojans
  => 8.6 Security Of Data
  => 8.7 Data Integrity
  => 9 Databases
  => 9.1 Flat-file Databases
  => 9.2 Introduction To Relational Databases
  => 9.3 The Aims Of Database Normalisation
  => 9.4 Security And Integrity Issues
  => 9.5 Database Management
  => 10 Data Structures
  => 10.1 Introduction
  => 10.2 Linear Lists
  => 10.3 Linked Lists
  => 10.4 Queues
  => 10.5 Stacks
  => 10.6 Binary Trees
  => 11 Systems Development
  => 11.1 Introduction
  => 11.2 Analysis
  => 11.3 Design
  => 11.4 Graphical System Representation
  => 11.5 Development
  => 11.6 Testing
  => 11.7 Implementation
  => 11.8 Maintenance
  => 11.9 System Documentation
  => 12 Peripherals
  => 12.1 Input Devices
  => 12.2 Output Devices
  => 12.3 Storage Devices
  => 13 Computer Architecture
  => 13.1 The Processor And Memory
  => 13.2 The Fetch-Execute Cycle
  => 13.3 Data Buses
  => 13.4 Processing Architectures
  => 13.5 Assembly Language
  => 14 Translation
  => 14.1 Interpreters
  => 14.2 Compilers
  => 14.3 Compilation Phases
  => 14.4 Assemblers
  => 15 Operating Systems
  => 15.1 Operating System Functions
  => 15.2 Different OS Modes
  => 15.3 Job Control Language
  => 15.4 The Scheduler And Dispatcher
  => 15.5 Memory Management
  => 15.6 Peripheral Control
  => 15.7 Backing Store Management
  => 16 High Level Programming
  => 16.1 High And Low Level Languages
  => 16.2 Language Classification
  => 16.3 Language Generations
  => 16.4 Logic Programming
  => 16.5 Choosing A Programming Language
  => 17 Computers & Communication
  => 17.1 Data Transmission
  => 17.2 Local Area Networks
  => 17.3 Wide Area Networks
  => 17.4 The Internet
  बातमी वाचु शकता
  जनरल नॉलेज
  HELPLINE
  GALLERY
  Calculators and Converters
  Zoo Animal Photos
  Short form list
  LOGIN
  HOME
  CONTACT
  CHAT ME !!!
  INTRODUCTION
  SUBMIT URLs
  ADD OWN LINK
  Banner Exchange
  IPL T20 Live Scores
  NATIONAL ANTHEM OF INDIA
  Birthday Reminder
  FUNNY PAGE
  TOP LIST
  MAP AND SATELLITE IMAGE
  Your IP Address
  MOBILE WAP SETTINGS
  INDEX



Bookmark and Share



Online Reference
Dictionary, Encyclopedia & more
Word:
Look in: Dictionary & thesaurus
Medical Dictionary
Legal Dictionary
Financial Dictionary
Acronyms
Idioms
Encyclopedia
Wikipedia
Periodicals
Literature
Other languages:
by:


INDIA
8.6 Security Of Data
Section 8.6

8 Legal Issues And Data Security

8.6 Security Of Data

Keeping data secure means protecting data from various hazards.

Deliberate Destruction Of Data

  • Disgruntled employees
  • Terrorists acts
  • Hackers gaining access

Accidental Data Destruction

  • Hardware failure
  • Program failure
  • Operator error

Environmental Hazards

  • Fires
  • Floods
  • Power Surges
  • Hurricanes
  • Earthqaukes

8.6.1 Backup

There are four main methods of backing-up data.

Periodic Backup

Backups are made regularly and kept in a safe place. This is the least satisfactory method.

File Generations

Grandfather, and son files can be stored along with their respective transactions. This method is only used with sequential file processing.

Incremental Dumping

During a user's work session all the updated files are marked. When the user logs out these files are copied or 'dumped' to another disk.

Transaction Logging

Every updating transaction/operation on a master file is recorded in a separate transaction log.

8.6.2 Recovery

Recovery procedures are established so that an organisation may be able to continue operating in the case of hardware of data loss.

Disaster Planning

There is a contigency plan that comes into action when an organisations data is used.

A separate site with offices, computers and an up-to-date copy of the organisations data is used.

Bypass Procedures

Bypass procedures are invoked if the central computer in an on-line system fails. Intelligent terminals with their own backing store can record transactions temporarily until the main computer is back on-line.

8.6.3 Malicious Damage

Data security is threatened by both hackers from outside and employees within a company.

Such people may be trying to defraud the company or just be disgruntled.

Steps to Counteract Threats

  • Use password protection (may be on encrypted files).
  • Immediately remove access rights for employees who leave the company.
  • Vet prospective employees.
  • Restrict access to certain rooms or secure areas.
  • Educate staff watch out for security breaches.
  • Separate staff duties.
  • Appoint a security manager.

8.6.4 Password Protection

Usernames and passwords are usually stored in a table. The table is permanently stored in a file on a disk.

Password tables are often stored with authorisation tables that contain a user's rights to other files.

Passwords tables should be 'irreversibly' encrypted to prevent their contents from been read.

8.6.5 Data Encryption

In cryptography a message is converted from plain text to ciphertext.

The encrypted message is sent along a communications link and the receiving computer decrypts the message.

Transition Cyphers

The characters of a message are rearranged in some way.

Example

"MEET_ME_TONIGHT_AT_8"

could be written, row by row, in a five character wide grid:

MEET_
ME_TO
NIGHT
_AT_8

The grid is then read column by column and sent out as:

"MMN_EEIAE_GTTTH__OT8"

Substitution Ciphers

Each character is replaced by another character.

Example

Decode: "X2MM F4P2"

where A E I O U > 1 2 3 4 5 and consanants > next consanant in alphabet.

gives:

"WELL DONE"

8.6.6 Other Security Measures

Other than passwords, an authorised user can be identified by:

  • Iris recognition
  • Fingerprint recognition
  • Voice recognition
  • Face recognition

< Previous Back To Topic Next >

COMPUTER-WORLD1  
 
Username:
Password:
 
SHOUTBOX  
 








 
SMS 160by2  
 
Forgot Password / Username

 
VISITS  
 
 
Time  
  free guide to setting up a website
 
Today, there have been 93 visitorson this page!
Matrimony Search Widgets
Matrimony Search


Home
SILICONINDIA FACEBOOK YOUTUBE MYSPACE

HOME :: :: INDEX :: :: COMPUTING NOTES :: ::COMPUTER HELP

This website was created for free with Own-Free-Website.com. Would you also like to have your own website?
Sign up for free