Security of Data and Information

 To ensure the security of data and information, several strategies are implemented to minimize any harm.

 These include:

 Passwords-  used to restrict unauthorized access by confirming a user

 Backup Copies-  in case a file is corrupted/ lost, the backup copy is used

 Physical Barriers-  machines that store information and perform tasks are physically locked away

 Anti- Virus Software-  all files are scanned to detect any viruses present, and then removes the virus.

 Firewalls-  protects from hackers by monitoring the transfer of information

 Data encryption-  similar to a ‘code’; is written in a way that is not understood by others

 Audit trails-  system maintains a record of all transactions



