The document discusses several methods for securing data, including making regular backups of data to another storage device, keeping backups in a fireproof safe, using passwords to secure files and storage devices, encrypting data to make it unreadable without a key, restricting database access to particular views based on username, and using locking mechanisms in database management systems to control editing of records.
2. -
-
-
To copy files to a separate secondary storage device as a precaution in
case the first device fails
Making a backup od data is the process of copying the data to another
permanent storage device such as a CD/DVD
Backups prevent the loss of data if the original data is damaged or lost as
all disks will eventually fail
Reasons for data loss include faults, theft, fire, viruses, intentional
malicious damage, insufficient or inappropriate validation.
Regular backups should be kept in a fireproof safe
Full and partial backups can be used
o Full: all files
o Partial: only those that have changed
Incremental and differential backup are strategies that include partial
back ups
3. -
Involves securing the room in which servers and other system critical
devices are located
-
Many systems have all the hardware locked in a climate controlled room
-
Access controls of various types are implemented to prevent
unauthorized persons entering the room
4. -
Passwords can be used to secure individual files, directories or even
entire storage devices
-
Combination of user names and passwords are used by operation
systems, network software and multi-user application to confirm the
identity of users
-
Users can set passwords for individual files from within the file’s related
software application
5. -
Encryption is the process of making data unreadable by those who do not
possess the description key
-
Decryption is the process of decoding encrypted data using a key, the
opposite of encrypting
-
This is known as cryptography, its alters raw data un a way so that is
impossible to read and prevents unauthorized access
-
To enable decryption, secret information called keys are used
6. -
Restricting access within databases commonly involves restricting access
to particular views of the data based on usernames and the client
application being executed by these users
-
The restricted portion of a database made available to a user. Views
select particular data but have no effect on the underlying organization of
the database
7. -
DBMS software retrieves records rather than files, editing can also be
controlled based on records rather than complete files.
-
This prevents the unnecessary or inaccurate changes happening to the
database without the authorization of administrators
-
Two types of locking
-
pessimistic: first user to edit, locks it
-
optimistic each change produces two options the old or new, either
of which can be stored or discarded