12 Nov 2019

  • November 12, 2019
  • Amitraj
Due to the increased dependence on computer security becomes a big issue. For maintaining and controlling thedata integrity and security, Project managers and analysts must take the appropriate measures \decision. To project from unauthorized access candidate system uses built in hardware’s procedures, programs or set of rulesetc. In this, we learn about the security steps of system and data. We also learn about the disaster in which wediscuss the planning and maintaining techniques for disasters .Today ethics and its standards are a big issue that describes the overall view of the designers, managers and analysts.



 Definition
There are four issues related to system security. These are
1. Security
2. Confidentiality
3. Privacy
4. Integrity
Files and data structures and access procedures/techniques are used in these issues.


System security
It means to protect the system against accidental or deliberate loss from a threat by technical innovations and procedures that are applied to the hardware and operating systems. On the other hand, data security refers to save the data from damage, modification, disclosure or destruction.

Integrity
System integrity describes the well prepared functions of hardware programs, safety issues and physical security tasks that help to protect the system from external threats such as wiretapping etc. In comparison, Data integrity refers that the data used by the end users have not been accidentally wrong, changed or destructed. It means the data of end users is in its original form.


Privacy
It provides us the set of rules or rights, according to which users or organizations share or accept the information with or from others. It also tells the organization that how the information can be saved against unwanted, unfair, unwilling or propagation threats.


Confidentiality
A special term called confidentiality provides the sensitive and powerful information in a database to minimize the possible invasion of privacy. Confidentiality is an attribute of information that describes the protection needs of information.
Data privacy and security issues go beyond the scope of the system development. Thus an organization that uses the databases needs a special attention to control and maintain the viable information. These controls are of three types:-

1) Controls related to passwords, encryption and monitoring users.
2) Physical safety or protection from fire, flood and another physical destruction.
3) Database integrity by using data validation techniques.

Related Posts:

  • Different types of the system Discuss the Different types of the system:- 1. Physical System : A physical system can be tangible or visible which can be touch and also be counted. Physical system can be operated statically or dynamically. 2. Abstract … Read More
  • Recognition of Needs Recognition of Needs One must know what the problem is before it can be solved. The basis of candidate system is recognition of need for improving the system. The key question is: What is the problem? This recognition of ne… Read More
  • Information Gathering Techniques in System Analysis Information Gathering Techniques The main aim of fact finding techniques is to determine the information requirements of an organization used by analysts to prepare a precise SRS understood by user. Ideal SRS Document shou… Read More
  • Introduction to the Basic Elements of the system Elements of the System:- A system has three basic elements input, processing and output. The other elements include control, feedback, boundaries, environment and interfaces. Input: Input is what data the system receives t… Read More
  • System Development Life Cycle (SDLC) Approaches System Development Life Cycle (SDLC) Approaches The Systems (or Software) Development Life Cycle (SDLC) is a domain of competency used in systems engineering, information systems and software engineering to describe a proce… Read More

Translate

Popular Posts