| 
 Files used in applications are  vital to the
running of a system. Any loss or corruption of data will have
serious or fatal implications for the performance of the
application. Delays, loss of business and possible legal action
may result. For these reasons many safeguards are used to protect
files from: 
    - Hardware failures - all hardware 
	dies eventually.
 
    - Software failures - programming bugs 
	can be hidden for a long time before a rare combination of events reveals 
	the problem. 
 
    - Human Errors  - Accidental 
	changing of data or deletion of files.
 
    - Deliberate damage -  may be caused 
	by an angry employee, a virus or a hacker.
 
 
Physical Security 
    - Security guards
 
    - Alarm systems
 
    - Locks on rooms and on computers
 
    - Access to rooms by swipe cards / fingerprint scan / retina scan
 
    - Write-protect mechanisms - some 
	drives and memory sticks have write-protect tabs. When switched on, the 
	changing of data is impossible.
 
 
Passwords - Levels of permitted access 
In
order to gain access to the system a user is supplied with a  user
name together with a personal password. 
The operating system will check the user 
name and password are valid before allowing the user to log in. 
Some files may be
open by anyone, others only by those users with a particular
level of access. It is possible that some 
levels of access allow a user to read but not change the data. The main computer's operating system makes sure that file access is appropriate for the
user's password. 
File Attributes 
The file itself has attributes that can 
be set. The commonly used ones in Windows are: 
	- Read-only 
	- the file can be read but not altered
 
	- Hidden 
	- the file is not displayed in listings of files.
 
 
  
  
Firewalls 
Computers connected to networks - especially the Internet - need to be 
protected from hackers. Firewalls are 
software methods of blocking access to anyone from outside a network unless they 
are authorised. 
   |