Advertisment

Security is the key to data integrity

author-image
CIOL Bureau
Updated On
New Update

The integrity of data means its accuracy and completeness. Data has integrity if it has not been corrupted in any way. In other words we can say that data integrity ensures that the data is complete, it is preserved for its intended use and the data is identically maintained during any operation, such as transfer, storage and retrieval. Data integrity also ensures that the data is accessed and altered by the authorized persons only.

Advertisment

In the era of business transparency, ensuring the integrity of data is a tough task. Data integrity loses its reliability when any of the following components is missing:

  • Completeness
  • Consistency
  • Timeliness
  • Accuracy andV
  • Validity

So maintaining data integrity is a challenging Job. There are several methods adopting which help us to overcome the challenges. One of such methods is Mirroring of Data.

Advertisment

Mirroring of Data

In simple terms, Mirroring of Data means copying data from one location to a storage device in real time and because the data is copied in real time, the information stored from the original location is always an exact copy of the data from the production device. Data mirroring is useful in the speedy recovery of critical data after a disaster.

There are various resources to which you can mirror your data:

  • A removable hard drive on the same computer
  • A removable hard drive on a different computer
  • A storage device (USB)
  • A storage appliance (NAS)
  • A hard drive on a separate computer (IDE or SATA)
Advertisment

Standardization in preserving data integrity

Standardization plays an important role in the preservation of data integrity. The use of standards is one strategy, which can be used to preserve the integrity of and access to digital information. Facilitating the transfer of information between hardware and software platforms as technologies evolve can assist adherence to standards. Use of standards can also help ensure best practice in the management of digital information.

Key applications

We, at Infogain, minimize the threats to Data integrity by providing:

Network Security  

Advertisment
  • Separate VLAN /Subnet for each customer through Cisco Layer 3 Chassis based redundant Core switches providing network security to the customer machines /Data over VPN tunnels.
  • 3DES encryption for all customer VPN connectivity.

                                                                                                                 

Cisco PIX Firewall providing following protections: Stringent firewall policies allowing specific ports only and blocking the remaining ones.

Advertisment

Security Policies well Defined and established IT electronic communications policy defining acceptable usage of network resources. Well documented password policy defining the guidelines for maintaining network/Systems passwords.

Antispyware Microsoft Antispyware solution providing protections against spywares.

CD Burning Policy disabling of FDDs on all the systems on LAN Disabling of USB writable devices on LAN Well Documented Backup Process

Advertisment

Spam Protection 

  • Anti Spam mail solution, providing protection against junk mails.

Advertisment

Data Center and IIN

Both Data Center and Intelligence Information Network (IIN) are very important concepts in maintaining data integrity.

Data Center is usually maintained by an organization for the purpose of handling the data necessary for its operations. As data is a crucial aspect of most organizational operations, organizations tend to be very protective of their data. A data center must therefore keep high standards for assuring the integrity and functionality of its hosted computer environment. This is depicted in its physical and logical layout. Data centers are also used for off site backups.

Intelligence Information Network (IIN) manages the distribution of the resources dynamically, relying on message level communications and policies. Such on-demand resource computing will require closely integrating advanced technologies such as storage, security, and wirelessing seamlessly to the current IP infrastructure.

Current Trends

Data integrity is tightly coupled with information security and how the organization intends to deal with security threats. Management has to take care of data and the security of data as a critical business need, which must be addressed through policy.

Apart from the data Centers and IIN, now a days Information Security Management System (ISMS) is also implemented in many organizations. ISMS is a management system used for establishing and maintaining a secure information environment. We, at Infogain, are also practicing the same management system.

Lack of data integrity can challenge your core business. In today’s competitive business climate, dismissing the importance of data integrity is clearly unacceptable. While the importance of data integrity seems obvious, it's not really easy to describe how to design a system that emphasizes it. The organizations must select method(s) that best suit their needs and environment.

The author is Senior Manager,

IT Infrastructure, Infogain Corporation.