integrityFill the gaps with appropriate forms of the words.Example:(1) assurance This term you selected is being presented by searchDatabase.com, a TechTarget site for Database professionals. Integrity, in terms of data and network security, is the (1).......... that information can only be accessed or modified by those (2).............. to do so. Measures taken to ensure integrity include controlling the physical environment of networked terminals and servers, restricting access to data, and (3)................. rigorous authentication practices. Data integrity can also be threatened by (4).............. hazards, such as heat, dust, and electrical surges. Practices followed to protect data (5)..............in the physical environment include: making servers accessible only to network administrators, keeping (6).............. media (such as cables and connectors) covered and protected to ensure that they cannot be (7)..........., and protecting hardware and storage media from power surges, electrostatic (8)..............., and magnetism. Network administration measures to ensure data integrity include: maintaining current (9)................. levels for all users, documenting system administration procedures, parameters, and maintenance activities, and creating disaster recovery plans for (10)..............such as power outages, server (11)............, and virus attacks. |
assureauthorize maintain environment integral transmit tap charge author occur fail |