storing & retrieving

Click here to load reader

Post on 18-Jul-2015

5.259 views

Category:

Education

0 download

Embed Size (px)

TRANSCRIPT

  • Storing and retrieving is a two-step process that refers to the of moving data to and from storage devices An important point is that the data stored must be absolutely identical to the data retrieved otherwise the information is considered unreliable and useless.

  • IPP 4 concerning storage and security states that the information must be stored securely to prevent loss or misuse.

    Dependant on whether or not it is designed to protect against both accidental and malicious attempts to avoid security policies.Data can also be lost or destroyed by the administrator who has access to the system or network or by a hacker who could exploit, delete, destroy or render the data inaccessible.

  • IPP 5-7 concerning access and amendment refers to agencies being required to record the types of information that they hold and who they give the information access to which can be amended or corrected if its wrong.

    An administrator or a user that holds administrative privileges have access to the data being stored and may access the data for the purpose of financial gain.

    A hacker could exploit the data via phishing and fraud may choose to read, or steal the data to eavesdrop on activities, view transactions or manipulate data for personal or financial gain.

  • Data is stored online and can be easily accessed anywhere on a computer that is connected to the internet.

    Can eliminate the need for USBs and other forms of portable storage devices. Can minimize the chances of losing data and can be used as a form of backing up information.

  • Unlawful access and retrieval of sensitive data which can enable one to steal another's identity. Distinguishes between legitimate and illegitimate people and movements. This is apparent in the dual purpose of passports, intended to both secure borders against illegal immigrants and security threats, and to enable travel for the legitimate.

  • The use of an object (RFID tag) applied/incorporated into a product, animal, or person for identification & tracking using radio waves. Tags can be read from several meters away & beyond the line of sight of the reader. These days it is smaller than a coin and can be put in anything from t-shirts to under human skin. Next generation technology that can make barcodes obsolete. Hackers and analysts are exposing potentially serious problems. Hackers could disable a car's RFID anti-theft feature, swap a product's price for a lower one, or copy medical information from an RFID chip.

  • Other forms of storage media include optical storage devices (CDs), flash storage devices such as USBs and compact flash cards such as memory cards.

    The majority of the issues concerning data security and unauthorised retrieval of these are when the device is stolen from another and accessed. The user can then alter or delete the information stored on the medium.