Due to the increased dependence on computer security becomes a big issue. For maintaining and controlling thedata integrity and security, Project managers and analysts must take the appropriate measures \decision. To project from unauthorized access candidate system uses built in hardware’s procedures, programs or set of rulesetc. In this, we learn about the security steps of system and data. We also learn about the disaster in which wediscuss the planning and maintaining techniques for disasters .Today ethics and its standards are a big issue that describes the overall view of the designers, managers and analysts.
Definition
There are four issues related to system security. These are
1. Security
2. Confidentiality
3. Privacy
4. Integrity
Files and data structures and access procedures/techniques are used in these issues.
System security
It means to protect the system against accidental or deliberate loss from a threat by technical innovations and procedures that are applied to the hardware and operating systems. On the other hand, data security refers to save the data from damage, modification, disclosure or destruction.
Integrity
System integrity describes the well prepared functions of hardware programs, safety issues and physical security tasks that help to protect the system from external threats such as wiretapping etc. In comparison, Data integrity refers that the data used by the end users have not been accidentally wrong, changed or destructed. It means the data of end users is in its original form.
Privacy
It provides us the set of rules or rights, according to which users or organizations share or accept the information with or from others. It also tells the organization that how the information can be saved against unwanted, unfair, unwilling or propagation threats.
Confidentiality
A special term called confidentiality provides the sensitive and powerful information in a database to minimize the possible invasion of privacy. Confidentiality is an attribute of information that describes the protection needs of information.
Data privacy and security issues go beyond the scope of the system development. Thus an organization that uses the databases needs a special attention to control and maintain the viable information. These controls are of three types:-
1) Controls related to passwords, encryption and monitoring users.
2) Physical safety or protection from fire, flood and another physical destruction.
3) Database integrity by using data validation techniques.
Definition
There are four issues related to system security. These are
1. Security
2. Confidentiality
3. Privacy
4. Integrity
Files and data structures and access procedures/techniques are used in these issues.
System security
It means to protect the system against accidental or deliberate loss from a threat by technical innovations and procedures that are applied to the hardware and operating systems. On the other hand, data security refers to save the data from damage, modification, disclosure or destruction.
Integrity
System integrity describes the well prepared functions of hardware programs, safety issues and physical security tasks that help to protect the system from external threats such as wiretapping etc. In comparison, Data integrity refers that the data used by the end users have not been accidentally wrong, changed or destructed. It means the data of end users is in its original form.
Privacy
It provides us the set of rules or rights, according to which users or organizations share or accept the information with or from others. It also tells the organization that how the information can be saved against unwanted, unfair, unwilling or propagation threats.
Confidentiality
A special term called confidentiality provides the sensitive and powerful information in a database to minimize the possible invasion of privacy. Confidentiality is an attribute of information that describes the protection needs of information.
Data privacy and security issues go beyond the scope of the system development. Thus an organization that uses the databases needs a special attention to control and maintain the viable information. These controls are of three types:-
1) Controls related to passwords, encryption and monitoring users.
2) Physical safety or protection from fire, flood and another physical destruction.
3) Database integrity by using data validation techniques.