This document discusses data security, file security, and computer viruses. It explains that data security and control involves protecting data from unauthorized access and destruction. It describes various methods for controlling data input, including manual control, data preparation, and validation checks. The document also discusses the need for file security to protect files from unauthorized users and the importance of user passwords and usernames. Finally, it outlines common sources of computer viruses and methods for detecting and removing viruses, such as using antivirus software and performing system restores.
2. Objectives
• Explain data security and Control
I. Manual Control
II.Data Preparation Control
III.Validation Checks
• Explain file security and control
I. Describe file security methods in computer installation
II. Explain the need for the security in computer installation
III. Explain the user password and username
• Explain Computer Virus
• State the various sources of viruses
• Describe the ways of protecting file from infection and
getting rid of computer virus
3. Data Security & Control
Data security & control means protecting &
scheming access to data, such as a database, from
destructive forces and the unwanted actions of
unauthorized users.
Data should be protected no
matter where it resides—in
databases, applications or
reports across production and
non-production
environments.
4. Securing & Controlling Data
Data security and control is imperative because If you put incorrect data into
a computer system then you will get incorrect results out of it. Processing
incorrect inputs will produce incorrect outputs. This leads to the acronym :
GIGO : Garbage In Garbage Out
The following are means in which data can be controlled at the point of entry;
• Manual Control: This is a process of ensuring data is correctly entered into
a computer manually by the user.
• Data Preparation Control: involves checking or logging the data in;
checking the data for accuracy; entering the data into the computer; and
developing and documenting a database structure that integrates the
various measures. Proper preparation of data is very critical in ensuring
data security
• Validation Check: This is an automatic check made by a computer to
ensure that any data entered into the computer is sensible.
5. File Security & Control
• This is protecting files from unauthorized user.
• File security covers a lot of territory: locking your
computer room and your machine, protecting
your login accounts with passwords, using file
protection to keep your data from being
destroyed, encrypting network communications
lines, and using special shields to keep
electromagnetic emanations from leaking out of
your computer, antivirus installation, performing
regular backups etc.
6. Need for Security in Computer
Installation
The need for security is very significant to in order
to be assured of the following:
• Information remains confidential and only those
who should access that information, can.
• No one has been able to change your
information, so you can depend on its accuracy
(information integrity).
• Information is available when you need it (by
making back-up copies and, if appropriate,
storing the back-up copies off-site).
7. Computer Virus
A computer virus is a program or piece of code that is
loaded onto your computer without your knowledge and
runs against your wishes. Viruses can also replicate
themselves.
The following are the major sources of virus:
• Downloadable Programs
• Cracked Software
• Email Attachments
• Internet
• Booting From CD
• Removable Data Storage Media
8. Ways to Get Rid of Virus
The following are the ways of getting rid of virus,
preventing computer systems from virus
contamination and ways of protecting files from
virus infection:
• Perform System Restore
• Scan using antivirus
• Clean Install