APM Welcome, APM North West Network Conference, Synergies Across Sectors
Securing data
1. SECURING DATA
Data security is about achieving 2
somewhat aims. First, its an attempt to
prevent any data being lost
corrupted, which ensures that the
system remains operational. Secondly
it aims to prevent unauthorised access
to the data , completely restricting
unauthorised access by assigning
special levels of permission to each
individual.
Joseph Antoun Year 12 IPT Homework
2. Back-Up
Making a back-up or recovery is the process of
storing or copying data to another permanent
storage device. (CD, Magnetic Tape)
Recovery of the data would be the opposite
process to which data is retrieved from the
stored location and placed back in the system
Main reason Is preventing data loss in the
event that a event does occur.
3. Physical Security Measures
Physical Security involves the room which
servers and other system critical devices are
located in an obvious technique for reducing
data loss and unauthorised access.
Some ideas of implementation may include –
Physical Locks
Security Cameras
Security Guards
4. Username + Password
Passwords can be used to secure individual
files, or even large storage devices. These
usernames and passwords can be used for
granting the level of access that an individual
has on that system.
Data secured by passwords is only secure
whilst the password remains secret.
(Aint that obvious Samuel Davis ?)
5. Encryption & Decryption
Encryption is the process of making data
unreadable by those who don’t possess the
encryption key
Encryption alters the data in such a way to
which is unreadable to the threat.
Decryption is the process of decoding
encrypted data using a key.
6. Restricting Access using DBMS & Record
locks
The restriction may be implemented through
the level of permissions granted through the
usernames and passwords.
DBMS software retrieves records rather than
files. It locks the Database from edits.
Pessemisitc is when they must wait for the
main user to edit before they can edit
themselves.
Optimistic locking is much more positive. First
user may edit, however another user will
review and determine whether it stays or goes.