home
Guest
Signup/Login
to unlock all features
[quote uid=merrylarry pid=1055] 4a (i)Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Data security also protects data from corruption. (ii) A data risk assessment is the process of identifying potential hazards an organization may face and analyzing methods of response if exposure occurs. (bi) Access Control is any mechanism by which a system grants or revokes the right to access some data, or perform some action. Normally, a user must first Login to a system, using some Authentication system. Next, the Access Control mechanism controls what operations the user may or may not make by comparing the User ID to an Access Control database (bii) Access is the flow of information between a subject and an object. Access controls are security features that control how users and systems communicate and interact with other systems and resources. c. 1. Data policies, procedures, standards 2. Planning- development of organization’s IT strategy, enterprise model, cost/benefit model, design of database environment, and administration plan. 3. Data conflict (ownership) resolution [/quote]