The process of maintaining multi-user operating system software must ensure that the integrity and security of the software is maintained.
Integrity
To maintain integrity, data must not be changed in transit and steps must be taken to ensure that data cannot be altered by an unauthorized person or program. Such measures include implementing user access controls and version control to prevent erroneous changes or accidental deletion by authorized users. Other measures include the use of checksums and cryptographic checksums to verify integrity. Network administration measures to ensure data integrity include documenting system administration procedures, parameters and maintenance activities, and creating disaster recovery plans for occurrences such as power outages, server failure or security attacks. Should data become corrupted, backups or redundancies must be available to restore the affected data to its correct state.
Security
Security is critical for enterprises and organizations of all sizes and in all industries. Weak security can result in compromised systems or data, either by a malicious threat actor or an unintentional internal threat.
Application security – the protection of applications from threats that seek to manipulate application and access, steal, modify or delete data. These protections use software, hardware and policies, and are sometimes called countermeasures. Common countermeasures include application firewalls, encryption programs, patch management and biometric authentication systems.
Leave a Reply
You must be logged in to post a comment.