Possible Threats On Data Integrity And Security

By | June 3, 2016

With the rapid developments in technology at present there is a high risk related to data and information stored in computers and on the internet cloud. Therefore risk management is very important to most organizations and individuals, especially those that are of financial nature. A risk can be defined as an impact on the business and hence it is quantifiable. On the other hand a failure mode is a way in which something can go wrong and a threat is something that can cause failure; which is usually an external event that may or may not happen. In this article we shall explore in detail the threats imposed on data security and the possible ways to mitigate them.
The three main threats that are involved with data security are malicious action, disasters and hardware and software failure. Malicious actions are those that are carried out deliberately, either with the intention of doing damage or committing another crime. The most important types of malicious are hacking, introduction of a computer virus and fraud. Hacking is obtaining unauthorized access to data or computer systems. This is mainly done with the use of internet, dial up telecommunication links, through electronic eavesdropping and internal hacking. Therefore at the time of website design Dubai, browsing the internet and gaining internet access it is important to take precautionary steps.
On the other hand, computer viruses are programs that can duplicate themselves. They “infect” other programs by adding a copy of themselves to the end of the program. There are various types of viruses as macros, worms, Trojans and many more. Certain people with ulterior motives create viruses and using website design software creates false/fake websites so that the PC of any visitor to that website is infected with the virus. In computer frauds, the computer is used to create false documentation by taking advantage of weaknesses in the organization’s procedures and controls rather than in its computer systems.
Another main threat to data security is disaster which includes various categories such as fire, smoke flood and explosions. The effects of these natural disasters can usually result in the loss of everything in the affected area. The most common causes of hardware failure are wear and tear and environmental factors such as variations in power supply. Software failure is often the result of errors made when the software was written. All these causes impose threats on the integrity and safety of data and information.
The possible risk prevention techniques that are commonly used can be named as contingency sites, fault tolerance, backups and checkpoints, passwords and access security and encryption. Contingency arrangements allow organizations to use alternative computer equipment if they have a problem. We can restrict access to systems by asking for a code to gain access.