answersLogoWhite

0

Despite a tightening in computer security, data systems continue to be infiltrated each and every day by people who should not be on them. Traditional methods of protection such as passwords and firewalls are becomingly increasingly easy to bypass, and computer systems have never in all of history been more venerable. Typically, most firms find themselves in a position where an ex-employee, disgruntled and seeking revenge (and with a thorough knowledge of how the firms systems work, though no longer legally authorized to access it) will access the system from an external location and harm the network. Once inside the ex-employee will often seek revenge by seeking to either corrupt information stored on the system or harm the actual system itself. Repair costs in this case are quantified for the affected firm not only in terms of monetary amounts, but also in lost productivity and valuable time. In addition the integrity and reliability of the data stored on the computer needs to, from then onwards, be checked and monitored on an ongoing bases.

User Avatar

Wiki User

18y ago

What else can I help you with?

Related Questions

The concept of security and integrity in database are interrelated Discuss how the two affect database system?

The concept of security in a database involves protecting the system and its data from unauthorized access, alteration, or destruction. This ensures that only authorized users have access to the database and that the data remains confidential. On the other hand, integrity refers to maintaining the accuracy, consistency, and reliability of the data within the database. An important aspect of integrity is ensuring that data is not modified or accessed inappropriately, maintaining its quality and reliability. Overall, security measures help maintain data integrity, as unauthorized access or modifications can compromise the integrity of the data within the database system.


What is the function of UAC?

User Account Control (UAC) is a security feature in Windows operating systems that helps prevent unauthorized changes to the system. It does this by prompting users for administrative permission before allowing software to make changes that could affect the system's operation. UAC aims to reduce the risk of malware infections and unauthorized access by ensuring users are aware of actions that require elevated privileges. This helps maintain system integrity and security.


List the main type of threat that could affect adatabase system and for each describe the control that you would use to counteract each of them?

The main types of threats to a database system include unauthorized access, data breaches, and data corruption. To counter unauthorized access, implementing strong authentication mechanisms, such as multi-factor authentication, can enhance security. For data breaches, employing encryption for data at rest and in transit helps protect sensitive information. To prevent data corruption, regular backups and data integrity checks should be conducted to ensure that any corruption can be quickly identified and remedied.


When was the computer misuse act introduced and why?

The computer misuse act came into affect in 1990. The United Kingdom's Parliament enacted it after a highly publicized court case, R v Gold and Schriffen in 1988, one of the earliest to deal with early cyber crime. It covers issues regarding unauthorized access to materials on computers, computer-related activities enabling other types of crime, and modifications to the materials or functionality of computers.


How can storing the same facts in different computer files potentially affect the integrity of data?

when in one computer modify that file it will not be updated in all the other computers it affects the data integrity. User may not know which file is having the latest information. I have synchronizing or organising tool to over come this issue.


What guideline affect how information shared?

Some guidelines that affect how information is shared include privacy policies, confidentiality agreements, and data protection regulations. These guidelines help ensure that sensitive information is handled securely and responsibly to protect individuals' privacy and prevent unauthorized access or disclosure.


Is OS responsible for privacy?

The OS (operatnig system) is not responsible for personal privacy but it is responsible for maintaining the integrity and security of its computer system. It should insure that a running application only has access to system facilities that it should be allowed to access and change. When more than one application or program is being processed in the computer they each run independently of each other and should not be allowed to affect the activity and outcome of any other program's execution, unless programs were designed to communicate with each other using a system provided capability.


Which primary domain gets impacted if a Hacker penetrates IT infrastructure through modem bank?

If a hacker penetrates IT infrastructure through a modem bank, the primary domain impacted is the Information Security domain. This breach can lead to unauthorized access to sensitive data, compromising the confidentiality, integrity, and availability of information systems. Additionally, it may affect other domains such as Operational Technology and Network Security, potentially resulting in operational disruptions and financial losses.


How does technology affect maintaining confidentiality of medical records?

Though medical records are usually encrypted, there is a chance that hackers can access them. Certain technologies allow savvy computer users to access hidden files.


Will downloading music on a computer to mp3 player affect computer files?

No. It should not affect your computer files.


How does random access memory affect the performance of your computer?

RAM is the virtual memory of your computer; the more RAM you have, the more programs you can run at one time. However, that is just a brief explanation.


What external environmental factors can affect a computer monitor?

nothing can affect a computer