Difference between Data Security and Data Integrity
1. Data Security :
Data security refers to the prevention of data from unauthorized users. It is only allowed to access the data to the authorized users. In database, the DBA or head of department can access all the data. Some users are only allowed to retrieve data, whereas others are allowed to retrieve as well as to modify the data.
2. Data Integrity :
Data integrity is defined as the data contained in the database is both correct and consistent. For this purpose, the data stored in the database must satisfy certain types of procedures (rules). The data in a database must be correct and consistent. So, data stored in the database must satisfy certain types of procedure (rules). DBMS provides different ways to implement such types of constraints (rules). This improves data integrity in a database.
Difference between Data Security and Data Integrity :
|S.No.||Data Security||Data Integrity|
|1.||Data security refers to the prevention of data corruption through the use of controlled access mechanisms.||Data integrity refers to the quality of data, which assures the data is complete and has a whole structure.|
|2.||Its motive is the protection of data.||Its motive is the validity of data.|
|3.||Its work is to only the people who should have access to the data are the only ones who can access the data.||Its work is to check the data is correct and not corrupt.|
|4.||It refers to making sure that data is accessed by its intended users, thus ensuring the privacy and protection of data.||It refers to the structure of the data and how it matches the schema of the database.|
|5.||Some of the popular means of data security are authentication/authorization, masking, and encryptions.||Some of the means to preserve integrity are backing up, error detection, designing a suitable user interface and correcting data.|
|6.||It relates to the physical form of data against accidental or intentional loss or misuse and destruction.||It relates to the logical protection (correct, complete and consistence) of data.|
|7.||It avoids unauthorized access of data.||It avoids human error when data is entered.|
|8.||It can be implemented through :||It can be implemented by following rule :|
Attention reader! Don’t stop learning now. Get hold of all the important CS Theory concepts for SDE interviews with the CS Theory Course at a student-friendly price and become industry ready.