Skip to main content

Data security

Data security is important to protect your data from theft and breach. Data security could be done in a small way such as using a password to access your file or data, or by using protocols or technology such as cryptography, and firewall devices, to prevent any untrusted user from reaching your data. 

Comments

Popular posts from this blog

types

 Data security protects your data from being accessible by unauthorized individuals, detecting what the accessed user did in the data or network, user actions saved as a log, and availability to access the data at any time. Those three fundamentals could conclude in the CIA of network security.

Availability

 The third popular term for data security is known as availability. the availability allows that authorized users to access data whenever they want and ensure that data are reachable. Which takes care of physical and data impacts. That physical impact such as ensuring that the power is available to that system all day considering that backup power and other physical impacts are natural disasters such as earthquakes, hurricanes, etc.  In the case of physical impacts, selecting the location of data centers is very important. In the case of data impacts, the most familiar terms in this section are called redundant networks or data. Redundant networks are focused on preparing alternative paths to access data in case of access to the main path is a failure, where the switching is done automatically. Whereas, the redundant database concentrates on providing an extra one or more databases to back up the main one. The Availability is to ensure that data or apps will be available and r...

Integrity

 The second term of data security is known as Integrity. In the previous term, we talk only about accessing data or viewing data and users can only explore the data without any modification on it. Integrity has the same functionality as confidentiality, but accessible users could make modifications to that data either by addition or deleting, or moving the data.  The Integrity will ensure that data correctness and accuracy by blocking unauthorized individuals to do any kind of modification. There are a number of tools that protect organizations or systems from being attacked from inside or outside that premises. such as using firewall devices, human monitoring the network for suspicious activity, and Access Control list privileges. Data integrity is the concept of ensuring that the data is not being tampered with or damaged by mistake or intentionally. Each accessible user has certain privileges to make modifications, but when that happens, it will register on the log file wit...