Open In App

Difference between Data Security and Data Integrity

Last Updated : 25 Mar, 2022
Improve
Improve
Like Article
Like
Save
Share
Report

1. Data Security : 
Data security refers to the prevention of data from unauthorized users. It is only allowed to access the data to the authorized users. In database, the DBA or head of department can access all the data. Some users are only allowed to retrieve data, whereas others are allowed to retrieve as well as to modify the data. 

2. Data Integrity : 
Data integrity is defined as the data contained in the database is both correct and consistent. For this purpose, the data stored in the database must satisfy certain types of procedures (rules). The data in a database must be correct and consistent. DBMS provides different ways to implement such types of constraints (rules). It can be implemented by rules i.e., Primary Key, Secondary Key, Foreign key. This improves data integrity in a database. 

Difference between Data Security and Data Integrity : 

S.No. Data Security Data Integrity
1. Data security refers to the prevention of data corruption through the use of controlled access mechanisms. Data integrity refers to the quality of data, which assures the data is complete and has a whole structure.
2. Its motive is the protection of data. Its motive is the validity of data.
3. Its work is to only the people who should have access to the data are the only ones who can access the data. Its work is to check the data is correct and not corrupt.
4. It refers to making sure that data is accessed by its intended users, thus ensuring the privacy and protection of data. It refers to the structure of the data and how it matches the schema of the database.
5. Some of the popular means of data security are authentication/authorization, masking, and encryptions. Some of the means to preserve integrity are backing up, error detection, designing a suitable user interface and correcting data.
6. It relates to the physical form of data against accidental or intentional loss or misuse and destruction. It relates to the logical protection (correct, complete and consistence) of data.
7. It avoids unauthorized access of data. It avoids human error when data is entered.
8.

It can be implemented through : 

  • user accounts (passwords)
  • authentication schemes

 

It can be implemented by following rule : 

  • Primary Key
  • Foreign Key
  • Relationship

 

 


Like Article
Suggest improvement
Share your thoughts in the comments

Similar Reads