Anda di halaman 1dari 4

Data corruption refers to errors in computer data that occur during writing, reading, storage, transmission, or processing, which

introduce unintended changes to the original data. Computer storage and transmission systems use a number of measures to provide data integrity, or lack of errors. In general, when data corruption occurs, the file containing that data may become inaccessible, and the system or the related application will give an error. For example, if a Microsoft Word file is corrupted, when you try to open that file with MS Word, you will get an error message, and the file would not be opened. Some programs can give a suggestion to repair the file automatically (after the error), and some programs cannot repair it. It depends on the level of corruption, and the in-built functionality of the application to handle the error. There are various causes of the corruption.

Contents
[hide]

1 Transmission 2 Storage 3 Countermeasures 4 See also o 4.1 Solutions 5 References

[edit] Transmission
Data corruption during transmission has a variety of causes. Interruption of data transmission causes information loss. Environmental conditions can interfere with data transmission, especially when dealing with wireless transmission methods. Heavy clouds can block satellite transmissions. Wireless networks are susceptible to interference from devices such as microwave ovens.

[edit] Storage
Data loss during storage has two broad causes: hardware and software failure. Background radiation, head crashes, and aging or wear of the storage device fall into the former category, while software failure typically occurs due to bugs in the code. Error detection and correction may occur in the hardware, the disk subsystem or adapter, or software which implements error checking and correction (i.e., RAID software such as mdadm for Linux). There are two types of data loss:

Undetected- also known as "silent corruption". These problems have been attributed to errors during the write process to disk. These are the most dangerous errors as there is no indication that the data is incorrect. Detected- these errors are most often caused by disk drive problems. Errors may either permanent or temporary, where temporary errors are able to be overcome when the operation is repeated by the hardware. Errors are normally detected by the hardware, either by the disk drive by checking the data read from the disk using the ECC/CRC error correcting code stored alongside the data on disk, or in the case of a RAID array by comparing the contents of the RAID strips with the ECC checksum or parity of the RAID stripe.

[edit] Co

Data loss is an error condition in information systems in which information is destroyed by failures or neglect in storage, transmission, or processing. Information systems implement backup and disaster recovery equipment and processes to prevent data loss or restore lost data. Data loss is distinguished from data unavailability, such as may arise from a network outage. Although the two have substantially similar effects, data unavailability is temporary, while data loss may be permanent. Data loss is also distinct from data spill, although the term data loss has been sometimes used in those incidents.[citation needed] Data loss incidents can, however, be also data spill incidents, in case media containing sensitive information is lost and subsequently acquired by another party. However, data spills are possible without the data being lost in the originating side.

Contents
[hide]

1 Types of data loss 2 Cost of data loss 3 Organizational responsibility 4 Prevention 5 Data recovery 6 Steps to be taken after data loss 7 See also 8 References 9 External links

[edit] Types of data loss

Intentional Action o Intentional deletion of a file or program Unintentional Action o Accidental deletion of a file or program o Misplacement of CDs or Memory sticks o Administration errors o Inability to read unknown file format Failure o Power failure, resulting in data in volatile memory not being saved to permanent memory. o Hardware failure, such as a head crash in a hard disk. o A software crash or freeze, resulting in data not being saved. o Software bugs or poor usability, such as not confirming a file delete command. o Business failure (vendor bankruptcy), where data is stored with a software vendor using Software-as-a-service and SaaS data escrow has not been provisioned. o Data corruption, such as file system corruption or database corruption. Disaster o Natural disaster, earthquake, flood, tornado, etc. o Fire Crime o Theft, hacking, sabotage, etc. o A malicious act, such as a worm, virus, hacker or theft of physical media.

Studies have consistently shown hardware failure and human error to be two most common causes of data loss, accounting for roughly three quarters of all incidents.[1] A commonly overlooked cause is a natural disaster. Although the probability is small, the only way to recover from data loss due to a natural disaster is to store backup data in a physically separate location.

[edit] Cost of data loss


The cost of a data loss event is directly related to the value of the data and the length of time that it is needed, but unavailable. Consider:

The cost of continuing without the data The cost of recreating the data The cost of notifying users in the event of a compromise

[edit] Organizational responsibility


Recent statistics show the number of publicized data loss events involving sensitive data is on the rise,[2] in part due to recent legislation, including the landmark California SB 1386, requiring the notification of data loss. This and other legislation has forced organizations to notify victims that their identity has potentially been compromised.

[edit] Prevention

Data loss prevention can rarely be guaranteed. However, the frequency of data loss and the impact can be greatly mitigated by taking proper precautions. The different types of data loss demand different types of precautions. For example, multiple power circuits with battery backup and a generator will only protect against power failures. Similarly, using a journaling file system and RAID storage will only protect against certain types of software and hardware failure. Regular data backups are an important asset to have when trying to recover after a data loss event, but they don't do much to prevent user errors or system failures. A well rounded approach to data protection has the best chance of avoiding data loss events. Such an approach will also include such mundane tasks as maintaining antivirus protection and network firewalls, as well as staying up to date with all published security fixes and system patches. User education is probably the most important, and most difficult, aspect of preventing data loss. Nothing else will prevent users from making mistakes that jeopardize data security.

Anda mungkin juga menyukai