This is concerned with protecting data from accidental or intentional disclosure to unauthorized persons or from unauthorized modification or destruction. These controls are implemented through operating systems, security access control programs, data communication products, and backup and recovery procedure and application programs. There controls address the following issues:
- Confidentiality of data
- Access control
- Critical nature of data
- Integrity of data
They must reflect the following two basic principles:
- Minimal privilege i.e. only the information the user needs to carry out an assigned task should be made available to him or her
- Minimal exposure i.e. once a user gains access to sensitive information he or she has the responsibility of protecting it by making sure only people whose duty require it obtain knowledge of this information while it is processed, stored or in transit.
Data integrity is the condition that exists as long as accidental or intentional destruction, alteration or loss of data does not occur. It is the preservation of data or for its intended use.
Kavungya answered the question on May 10, 2019 at 13:19
- Describe the Access control.(Solved)
Describe the Access control.
Date posted: May 10, 2019. Answers (1)
- Describe the general computer controls.(Solved)
Describe the general computer controls.
Date posted: May 10, 2019. Answers (1)
- Explain the defense strategies implemented for computer crimes.(Solved)
Explain the defense strategies implemented for computer crimes.
Date posted: May 10, 2019. Answers (1)
- Describe intentional threats.(Solved)
Describe intentional threats.
Date posted: May 10, 2019. Answers (1)
- Describe Unintentional threats.(Solved)
Describe Unintentional threats.
Date posted: May 10, 2019. Answers (1)
- Describe computer systems Vulnerability.(Solved)
Describe computer systems Vulnerability.
Date posted: May 10, 2019. Answers (1)
- Describe the database availability.(Solved)
Describe the database availability.
Date posted: May 10, 2019. Answers (1)
- Describe the database management systems security features.(Solved)
Describe the database management systems security features.
Date posted: May 10, 2019. Answers (1)
- Outline the database security issues.(Solved)
Outline the database security issues.
Date posted: May 10, 2019. Answers (1)
- Describe database security.(Solved)
Describe database security.
Date posted: May 10, 2019. Answers (1)
- State and explain the contents of a database.(Solved)
State and explain the contents of a database.
Date posted: May 10, 2019. Answers (1)
- Explain the disadvantages of database approach.(Solved)
Explain the disadvantages of database approach.
Date posted: May 10, 2019. Answers (1)
- State and explain the features that characterize a database approach.(Solved)
State and explain the features that characterize a database approach.
Date posted: May 10, 2019. Answers (1)
- State and explain the Limitations of a file system.(Solved)
State and explain the Limitations of a file system.
Date posted: May 10, 2019. Answers (1)
- Describe file systems.(Solved)
Describe file systems.
Date posted: May 10, 2019. Answers (1)
- Describe data warehousing.(Solved)
Describe data warehousing.
Date posted: May 10, 2019. Answers (1)
- Describe data mining.(Solved)
Describe data mining.
Date posted: May 10, 2019. Answers (1)
- Give the problems with IT planning.(Solved)
Give the problems with IT planning.
Date posted: May 10, 2019. Answers (1)
- Describe the completion of projects on time and within budgets.(Solved)
Describe the completion of projects on time and within budgets.
Date posted: May 10, 2019. Answers (1)
- Describe the allocation of resources in IT.(Solved)
Describe the allocation of resources in IT.
Date posted: May 10, 2019. Answers (1)