1 / 8

What is Data Integrity and Why Does It Matter

Data health has become a critical issue in the era of big data, as more and more data is stored and analysed. As a result, maintaining the datau2019s integrity is becoming increasingly important. The first step in protecting data is to understand the foundations of data integrity and how it works.

StacyJ409
Download Presentation

What is Data Integrity and Why Does It Matter

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. What is Data Integrity, and Why Does It Matter? Data health has become a critical issue in the era of big data, as more and more data is stored and analysed. As a result, maintaining the data’s integrity is becoming increasingly important. The first step in protecting data is to understand the foundations of data integrity and how it works. Data integrityis critical for a company’s efficient operation. If a company’s data is edited, erased, or updated, and there’s no way of knowing how it could affect data-driven business choices. Data integrity refers to the data’s consistency and trustworthiness across time. It refers to the data’s general correctness, completeness, and consistency. The lack of change between two updates of a data record indicates that the data is unmodified or intact. Data integrity

  2. relates to the safety and security of data in terms of regulatory compliance, such as GDPR compliance. The safety and security of data is ensured by a set of processes, regulations, and standards introduced throughout the design phase. No matter how long the information is held in the database, it will stay secure, complete, and dependable; that’s when you know the data’s integrity is safe. A data integrity architecture also assures that the data is not harmed by external factors. The phrase “data integrity” can be used to describe either a condition or a process. The data integrity framework describes a valid and correct data collection as a state. As a procedure, it refers to the steps used to assure the authenticity and correctness of a data set or all of the data in a database or construct. At both the physical and logical levels, data integrity may be ensured. Let’s take a closer look at the principles of data integrity: Data Integrity Types Physical and logical data integrity are the two forms of data integrity. In both hierarchical and relational databases, they are sets of procedures and methods that guarantee data integrity. Physical Integrity Physical integrity ensures that data is stored and retrieved in its entirety and correctness. It refers to the process of correctly storing

  3. and collecting data while ensuring data correctness and dependability. Protecting data from external factors such as power outages, data breaches, unanticipated disasters, human-caused harm, and more is part of the physical level of data integrity. Logical Integrity In a relational database, logical integrity ensures that data remains intact when it is utilized in various ways. Data correctness in a specific context is checked using logical integrity. When a human operator makes an error when manually entering data into the database, the logical integrity of the database is affected. Bugs, viruses, and moving data from one database site to another in the lack of particular fields are all examples of data integrity issues. Logic integrity may be divided into four categories: Entity Integrity Columns, rows, and tables are all parts of a database. These elements should be as numerous as necessary to ensure the accuracy of the data, but no more. To avoid a null field in the database, data integrity relies on the primary key, which is a set of unique values that uniquely identify bits of data. It ensures that the data is only listed once. The ability of relational systems to link and use data stored in tables in various ways is a characteristic. Referential Integrity

  4. A sequence of methods that assure data storage and uniform use is referred to as referential integrity. The database structure includes rules for using foreign keys, ensuring that only correct data updates, additions, and removals occur. Limitations on duplicate data entry, data accuracy guarantees, and the disallowance of data entry that does not apply are examples of these restrictions. Foreign keys are used to link data that is either shared or null. Take, for example, people who share the same task or work in the same department in terms of data integrity. Domain Integrity Domain integrity is a set of operations that ensures that each piece of data in a domain is accurate. A domain is a set of permitted values that a column can have. It has limitations on the format, kind, and amount of data that may be input. All values and categories are specified in domain integrity. In a database, all categories and values, including nulls, are set. User Defined Integrity The user’s restrictions and rules are included into this sort of logical integrity to meet their individual requirements. Entity, referential, and domain integrity may not necessarily ensure the security of data. For example, if an employer sets a column for employees to enter remedial actions, this information is subject to user-defined integrity. Difference Between Data Integrity and Data Security

  5. Data security and data integrity are frequently confused and used interchangeably. As a result, the phrase is frequently confused with data integrity, despite the fact that each term has a distinct meaning. Both data integrity and data security are critical to each other’s success. Data security refers to the protection of data against unauthorized access or intrusion, and it is required to maintain data integrity. Successful data security leads to data integrity. The phrase, however, solely relates to the authenticity and correctness of data, not the act of data protection. Data integrity may be maintained in a variety of methods, one of which is data security. Data security is concerned with preventing the loss of intellectual property, company papers, healthcare data, communications, trade secrets, and other sensitive information. Permissions management, data classification, identification, access management, threat detection, and security analytics are all aspects of data security methods. Threats To Data Integrity Human mistake or malicious activities can both compromise data integrity. Data integrity might be compromised if data is accidentally changed while being transferred from one device to another. The integrity of data contained in databases can be affected by a variety of reasons. Listed below are a few examples: Human Error

  6. Individuals that enter information improperly, duplicate, or delete data, do not follow the necessary protocols, or make mistakes in implementing data protection processes compromise data integrity. Transfer Error A transfer error happens when data is moved erroneously from one database place to another. In a relational database, a mistake can also occur when a piece of data is present in the destination table but not in the source table. Bugs and Viruses Spyware, malware, and viruses may all steal, change, or erase data. Compromised Hardware When a computer breaks, a server goes down, or any other computer fails, the hardware is compromised. When hardware is hacked, data can be displayed erroneously or incompletely, and data access might be limited or eliminated. Preserving Data Integrity Data is used by businesses to make choices. If the data is corrupted or wrong, it might be disastrous for that organisation. They frequently make data-driven business choices, which may have a substantial influence on the company’s goals if data integrity is not maintained.

  7. The dangers listed above highlight a facet of data security that can aid in data integrity preservation. Use the following checklist to reduce the risk to your company: Validate Input When your data set comes from a known or unknown source, you should require input validation (an end-user, another application, a malicious user, or any number of other sources). To guarantee that the data is correct, it should be validated and confirmed. Validate Data It’s crucial to ensure that data procedures haven’t been tampered with. Before you validate the data, identify the important criteria and qualities that are required for your company. Eliminate Duplicate Data Employees without proper access can readily find sensitive data from a protected database on a document, spreadsheet, email, or shared folder. As a result, it’s a good idea to clean up stray data and eliminate duplicates. Data Backup In addition to eradicating duplicates and maintaining data security, data backups are essential. Backing up all critical information may help prevent permanent data loss, and it goes a long way. It is vital

  8. to back up data as much as possible since enterprises may be targeted by ransomware. Access Control Access control is another important data security measure. Individuals in an organisation with malicious intentions might cause havoc on data. Implementing a model that allows users who require access to obtain it is also an effective method of access control. Individuals with an access key should be authorized to utilize sensitive servers, which should be separated and fastened to the floor. Keep an Audit Trail An audit trail can assist you track down your source in the event of a data breach. It also acts as a trail of breadcrumbs for locating and pinpointing the perpetrator and source of the breach.

More Related