Download as pdf or txt
Download as pdf or txt
You are on page 1of 16

Definition:

Data Security is the protection of data from


unauthorised access, theft, fire or malicious
damage and keeping the data safe from hazards.
It is one of the methods used to ensure data
integrity.
These include:

 Software Access Restriction

 Physical Access Restrictions


 This is concerned with physically protecting
data and ways to access that data.
 Many individuals and companies place
importance in protecting their information from
a software and/or network perspective, but
fewer devote resources to protecting data
physically.
 However, physical attacks to acquire sensitive
information do frequently occur.
 Physical safeguards deal with the protection of
hardware and software from accidental or malicious
damage, destruction or theft.
 One or a combination of the following methods may
enforce this:
 Only allowing access authorised personnel access
to computer facilities
 Security guards
 Burglar alarms
 Locks
 Biometric scans
 Monitoring system using video cameras
 Electronic doors that can only be opened using
passwords or magnetic cards
 Other structural security
 Storing data in a fireproof safe or cabinet
 Storing data in another building or in another
location
 Distributing work to a number of employees
instead of just one
 Archiving
Other structural security
 Storing data in a fireproof safe or cabinet
 Storing data in another building or in another
location
 Distributing work to a number of employees
instead of just one
 Archiving
 Biometrics is the automated method of recognizing
a person based on a physiological or behavioural
characteristic.

 Biometric technologies are becoming the


foundation of an extensive array of highly secure
identification and personal verification solutions.

 Biometric technologies should be considered and


evaluated giving full consideration to the following
characteristics:
 Fingerprints
 Face Recognition
 Speaker Recognition
 Iris Recognition
 Hand and Finger Geometry
 Signature Verification
 This is the means of ensuring that data is kept
safe from corruption and that access to it is
suitably controlled. Thus data security helps
to ensure privacy. It also helps in protecting
personal data.

 This is vital for all users to protect software


and data from accidental loss or deletion of
files.
 Some of the most common software safeguards
are:
 Passwords for the system, individual files or folders
 Audit trails or access logs
 Disk Lock, Encryption & Firewall
 Anti-virus software
 Backup procedures
 Archiving
These include:
 Viruses
 Common Types:
- Macro virus
- Boot virus
- File virus
- Time Bomb or Logic Bomb
 Worms
 Trojan Horses
 Computer surveillance refers to computer
spying that tracks all activity on a targeted
computer; it may also refer to the use of a
computer to monitor security cameras and
audio feeds. This can be a powerful tool when
it comes to collecting evidence.

 Data encryption is the translation of data


into a form that is unintelligible without a
deciphering mechanism.
 A password is a secret word or phrase that
gives a user access to a particular program or
system.

 Data privacy refers to the right of individuals


to determine what information is stored
about them and how that information will
used.

You might also like