System integrity The term system integrity has the following meanings: That condition of a system where in its specified operational and technical parameters.

Slides:



Advertisements
Similar presentations
Operating Systems Components of OS
Advertisements

Relational Database and Data Modeling
Data Modeling and Database Design Chapter 1: Database Systems: Architecture and Components.
Overview of IS Controls, Auditing, and Security Fall 2005.
Auditing Computer-Based Information Systems
Database Theory Why use database? Data is a valuable corporate resource which needs adequate accuracy, consistency and security controls. The centralized.
Introduction to Database Management  Department of Computer Science Northern Illinois University January 2001.
Computer Concepts 5th Edition Parsons/Oja Page 492 CHAPTER 10 File And Database Concepts Section A PARSONS/OJA Databases.
Monday, 08 June 2015Dr. Mohamed Osman1 What is Database Administration A high level function (technical Function) that is responsible for ► physical DB.
Database Management: Getting Data Together Chapter 14.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Data Management I DBMS Relational Systems. Overview u Introduction u DBMS –components –types u Relational Model –characteristics –implementation u Physical.
Discovering Computers Fundamentals, 2011 Edition Living in a Digital World.
Software Engineering For Beginners. General Information Lecturer, Patricia O’Byrne. – Times: –See noticeboard outside.
Databases and Database Management Systems
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
Servers Redundant Array of Inexpensive Disks (RAID) –A group of hard disks is called a disk array FIGURE Server with redundant NICs.
Key Management in Cryptography
Chapter 10 Information Systems Controls for System Reliability—Part 3: Processing Integrity and Availability Copyright © 2012 Pearson Education, Inc.
Management Information Systems
1 3 Computing System Fundamentals 3.4 Networked Computer Systems.
Topics Covered: Data preparation Data preparation Data capturing Data capturing Data verification and validation Data verification and validation Data.
Computer Based Information Systems Control UAA – ACCT 316 – Fall 2003 Accounting Information Systems Dr. Fred Barbee.
Database Architecture Introduction to Databases. The Nature of Data Un-structured Semi-structured Structured.
Database Technical Session By: Prof. Adarsh Patel.
Chapter 6 – Database Security  Integrity for databases: record integrity, data correctness, update integrity  Security for databases: access control,
1 Introduction to Database Systems. 2 Database and Database System / A database is a shared collection of logically related data designed to meet the.
Chapter 1 In-lab Quiz Next week
1 Welcome: To the second learning sequence “ Data Base (DB) and Data Base Management System (DBMS) “ Recap : In the previous learning sequence, we discussed.
Figures – Chapter 14. Figure 14.1 System layers where security may be compromised.
15 Copyright © 2007, Oracle. All rights reserved. Performing Database Backups.
Understanding the IT environment of the entity. Session objectives Defining contours of financial accounting in an IT environment and its characteristics.
Lecturer: Gareth Jones. How does a relational database organise data? What are the principles of a database management system? What are the principal.
S4: Understanding the IT environment of the entity.
Control Systems Design Part: FS Slovak University of Technology Faculty of Material Science and Technology in Trnava 2007.
IS 325 Notes for Wednesday August 28, Data is the Core of the Enterprise.
CIS/SUSL1 Fundamentals of DBMS S.V. Priyan Head/Department of Computing & Information Systems.
Chapter 2 Securing Network Server and User Workstations.
DATABASE MANAGEMENT SYSTEM By: YAMINI TRIPATHI. INTRODUCTION Consists - Collection of interrelated data - Set of programs to access those data Definition.
Programming Logic and Design Fourth Edition, Comprehensive Chapter 16 Using Relational Databases.
ADVANTAGES OF DATA BASE MANAGEMENT SYSTEM. TO BE DICUSSED... Advantages of Database Management System  Controlling Data RedundancyControlling Data Redundancy.
Overview All data can be corrupted, for reliable communications we must be able to detect and correct errors implemented at the data link and transport.
University of Sunderland COM 220 Lecture Seven Slide 1 Database Users & Administration.
1 TOPIC 6 DATABASE 6.1 Introduction to Database 6.2 Basic Concept of Database 6.3 Database Object DATABASE.
Backup Concepts. Introduction Backup and recovery procedures protect your database against data loss and reconstruct the data, should loss occur. The.
Data Integrity # Best Practices & Lessons Learned. Does It Fit Your Organization?
Flat Files Relational Databases
1 Chapter 9 Database Management. Objectives Overview Define the term, database, and explain how a database interacts with data and information Describe.
Copyright (c) 2014 Pearson Education, Inc. Introduction to DBMS.
Control of data redundancy Data consistency More information from the same amount of data Sharing of data Improved data integrity Improved security Enforcement.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
DATA MANAGEMENT AND DATABASES. Data Management Data management is the process of controlling the information generated during a research project or transaction.
Database Systems: Design, Implementation, and Management Eighth Edition Chapter 1 Database Systems.
 In this unit you will: impact  Assess the impact of TPS on participants.  Identify jobs  Identify jobs that have changed or have been created as a.
Building Preservation Environments with Data Grid Technology Reagan W. Moore Presenter: Praveen Namburi.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
MANAGEMENT INFORMATION SYSTEM
Database Management.
“ Database (DB) and Database Management System (DBMS) “
Database Database is a large collection of related data that can be stored, generally describes activities of an organization. An organised collection.
Database Management Systems
Managing the IT Function
Database Systems Chapter 1
UNIT IV RAID.
Database (DB) and Database Management System (DBMS)
Chapter 22, Part
Terms: Data: Database: Database Management System: INTRODUCTION
Definition Of Computer Security
Database management systems
Presentation transcript:

System integrity The term system integrity has the following meanings: That condition of a system where in its specified operational and technical parameters are within the prescribed limits. The quality of an AIS when it performs its intended function in an unimpaired manner, free from deliberate or inadvertent unauthorized manipulation of the system.

System integrity The state that exists when there is complete assurance that under all conditions an IT system is based on the logical correctness and reliability of the operating system, the logical completeness of the hardware and software that implement the protection mechanisms, and data integrity.

Data integrity Data integrity is data that have a complete or whole structure. All characteristics of the data including rules for how pieces of data relate, dates, and definitions must be correct for data to be complete.

Data integrity Data that has integrity is identically maintained during any operation (such as transfer, storage or retrieval). Data integrity is the assurance that data is consistent, certified and can be reliable.

How is data integrity obtained? (1) Accuracy and consistency of stored data, indicated by an absence of any alteration in data between two updates of a data record. Data integrity is imposed within a database at its design stage through the use of standard rules and procedures, and is maintained through the use of error checking and validation routines.

How is data integrity obtained? (2) Exact duplication of the sent data at the receiving end, achieved through the use of error checking and correcting protocols.

Integrity Checking Taxonomy 1- Scope of assurance I. Avoidance II. Detection III. Correction 2- Logical Layer I. Hardware II. File System III. User Level 3-Cheking Mode I. Online II. Offline

Scope of assurance Avoidance Read-only Storage - Journaling - Cryptographic File Systems - Transactional File Systems Detection Checksumming - Mirroring- Cyclic Redundancy Check (CRC) - Parity Correction Backup