Ch. 6 Security, privacy and data integrity

6.1 Data security

Difference between the terms security, privacy and integrity of data

Need for both the security of data and the security of the computer system

Security measures designed to protect computer systems, ranging from the stand-alone PC to a network of computers, including user accounts, passwords, authentication techniques such as digital signatures and biometrics, firewall, anti-virus software, anti-spyware, encryption

Threats to computer and data security posed by networks and the internet, including malware (virus, spyware), hackers, phishing, pharming

Methods that can be used to restrict the risks posed by threats

Security methods designed to protect the security of data, including encryption, access rights

6.2 Data integrity

Data validation and data verification help protect the integrity of data

Methods of data validation:

Methods of data verification during data entry and data transfer: