Bisnis Dahsyat tanpa modal

Sunday, April 11, 2010

Data Security


In general, the data is categorized into two, namely the data that is confidential and that no confidential data. Confidential data that are not normally would not be so considered. Noteworthy is that highly confidential data, where each of the data in it will be very valuable for those in need because the data can be easily duplicated. To get the information therein, usually carried out in various ways that are not valid.


Data security is usually related to the following:
a. Physically, in this case unauthorized person trying to get the data to the data by conducting sabotage or destruction of data storage.
b. Organization, in this case unauthorized person to get the data through negligence or leakage of members who handle the data.
c. External threat, in this case unauthorized person trying to get the data through the communication media and also make theft of data stored in the computer.

Computer security function is to maintain the three characteristics, namely:
a. Secrecy, the contents of a computer program can only be accessed by persons eligible. Type that included here is the reading, viewing, printing, or just knowing the existence of an object.
b. Integrity, is the content of a computer that can be modified by a person who has the right, which included writing here is, changing status, deleting, and creating.
c. Availability, is the content of a computer that is available to some groups given rights.

Secure data is data that meets the three characteristics of data security.
Looking at the fact that more data is processed by computer and sent via electronic communication devices, the threat to data security will increase. Some patterns of
threats to computer data communication can be described in the following:

a. Interruption, occurs when the data transmitted from A do not reach the person who is entitled B. Interruption is a pattern of attacks on the nature of the availability (availability of data). An example is damage to the hardware, operating system failure so the system can not find the file you are looking for.

b. Interception, occurs when a third party C successfully read the data transmitted. Interception is a pattern of attacks on the nature of the confidentiality / secrecy (confidentiality of data), for example, is doubling the program or data files that are not visible, or theft of data on the network in a way wireteapping.

c. Modification, the modification attack a third party C successfully alter the message that is sent. Modification is a pattern of attacks on the nature of the integrity (authenticity of data).
d. Fabrication, fabrication attack the attacker succeeded in sending data to the destination by utilizing the identity of another person. Fabrication is a pattern of attacks on the nature of authenticity (authentication data).
To anticipate the threats mentioned above need to be an attempt to protect data sent over communication channels, one of these efforts is to encode information in the data to be sent. Concealment of information that exist in a certain form that can not be understood other parties (who are not interested) is part of cryptography.

No comments:

Post a Comment