Professional Documents
Culture Documents
Data Security
Data Security
REPORT
DATA SECURITY
BY
VIKNESHRAJ D - 122012173030
BSC-ARTIFICIAL INTELLIGENCE
The goal of data security is to prevent unauthorized access, data breaches, and
data loss, which can result in serious consequences such as financial loss,
identity theft, reputational damage, and legal liabilities .
CIA Triad
The CIA triad is a common model that forms the basis for the development of
security systems. A comprehensive information security strategy includes
policies and security controls that minimize threats to these three crucial
components.
Data Security
Data security encompasses a range of technologies, processes, and policies that
are used to safeguard data. One of the most common methods is encryption,
which involves converting data into a coded format that can only be
deciphered with a decryption key. Encryption is often used to protect sensitive
information such as financial data, personal information, and confidential
business data.
Data backup and disaster recovery planning are also essential components of
data security. Backing up data ensures that data can be restored in case of data
loss or corruption, while disaster recovery planning helps organizations to
resume operations in case of a catastrophic event such as a natural disaster or
cyber attack.
There are several different types of data backup methods, including full
backups, incremental backups, and differential backups. Full backups involve
copying all of the data to the backup location, while incremental backups only
copy data that has changed since the last backup. Differential backups are
similar to incremental backups but only copy data that has changed since the
last full backup
The primary goal of data backup in data security is to ensure that data can be
restored to its previous state if the original data is lost or damaged. Data
backups involve creating copies of data and storing them on an alternate
location, such as a different device, a different site, or a cloud-based storage
system. The backup process can be automated and scheduled, so that backups
are taken regularly and consistently.
Confidentiality-Integrity-Availability
Confidentiality
Confidentiality is one of the three fundamental principles of the CIA triad, and
it refers to the protection of sensitive information from unauthorized access,
disclosure, or exposure. Confidentiality ensures that only authorized
individuals or entities can access or view the sensitive information
Availability is critical for ensuring that critical systems and services are
available when needed.