Computerized applications concentrate data in a format that is easy to access. In manual systems, data is voluminous and stored in many places. It is difficult for an unauthorized individual to spend much time undetected browsing through file cabinets or other manual storage areas.
But, using computerized media, unauthorized individuals can browse by using computer programs. This may be difficult to detect without adequate safeguards. In addition, the data can be copied quickly without leaving any visible trail or destroying the original data. Thus, the owners of the data may not be aware that the data has been compromised.
Database technology increases the risk of data manipulation and compromise. The more data stored in a single place, the greater the value of that information to an unauthorized individual. For example, the information about an individual in the payroll application is restricted to current pay information, but when that data is coupled with personnel history, not only is current pay information available, but also pay history, individual skills, years of employment, progression of employment and perhaps performance evaluations.
The concentration of data increases the problems of greater reliance on a single piece of data and reliance on a single computer file. If the fact entered is erroneous, the more applications that rely on that piece of data, the greater the impact of the error. In addition, the more applications that use the concentrated data, the greater the impact when the data is unavailable because of problems with hardware or software.
The types of conditions that can create problems attributable to the concentration of data in
computerized applications include:
• Inadequate access controls enabling unauthorized access to data
• Erroneous data and their impact on multiple users of the data
• Impact of hardware and software failures that make the data available to multiple users
đang được dịch, vui lòng đợi..
