1.6.1 — Data security
1.6.2 — Data integrity
System security is needed to protect the system and its data from the event of being lost.
A requirement for data to be recoverable if lost or corrupted.
A requirement for data to be available only to authorised users.
A requirement for data to be accurate and up to date.
Methods that helps to protect the computer from any unauthorised code or software that is a potential threat to the system.
The most common types of backup are full backup, incremental backup and differential backup.
Data in a system may become corrupted during processing.
Checks that the data entered is accurate.
Not 100% fail-safe; if the parity is incorrect and the count of 1s matches the incorrect parity then the transmission succeeds without being notified of an error.
The checksum is a number that is decided between the sender and receiver to check whether a message has been correctly sent.
Checks that the data entered is sensible.