You are on page 1of 14

TADA CUSEIRTY

(Guess for fun)


DATA SECURITY
(The secure world)

Presented by:
PAVAN.K
Apramaya H R
Data security
INTRODUCTION

 Data security plays a major role in the field of information technology, several organization
and companies use their cyber team to secure the data.
 The term data security divide into two term “DATA” and “SECURITY” where data refers
to the information and the security refers to providing safety to the information
 Data security is the practice of protecting digital information from unauthorized access,
corruption, or theft throughout its entire lifecycle.
 It is a set of processes and practices designed to protect your critical information
technology (IT) ecosystem.
 Data security involves deploying tools and technologies that enhance the organization’s
visibility into where its critical data resides and how it is used.
Data security definition

 Data security means protecting digital data such as those in the data base from destructive
forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data
breach.
How data is secured?

 Use firewalls.
 Use encrypted systems.
 Never give authorization to external parties.
 Use strong passwords and change them often.
 Public networks should be avoided as much as we can like WiFi on metros, airports.
 Do make trust issues while logging in another devices.
Implementation

 Data security can be applied using a range of techniques and technologies


 Which includes administrative controls, physical security, logical controls, organizational
standards and other safeguarding techniques that limit access to unauthorized or malicious users
or processes.
 Secure executive support and set the objectives.
 Define the scope of the system.
 Evaluate assets and analyse the risk.
 Define the Information Security Management System.
 Train and build competencies for the Roles.
 System maintenance and monitoring.
 Certification audit.
Examples of Data Security ≠ Compliance
8

40 million credit cards stolen, Target was PCI (Payment


Card Industry) compliant, attacked through HVAC vendor
Basic requirements

There are three core elements to data security that all organizations should follow:
 Confidentiality
 Integrity
 Availability
Importance of data security

 Data security functions to prevent data breaches, reduce risk of data


exposure, and for regulatory compliance purposes.
 Within any organization, data security’s role is to ensure the ongoing safe
and secure use of private data while minimizing exposure risk.
Advantages

 Protects system against viruses, worms, spyware, and other unwanted programs.
 Protection against data from theft.
 Protects the computer from being hacked.
 Minimizes computer freezing and crashes.
Applications of data security

 Data Security is a process of protecting files, databases, and accounts on a network by


adopting a set of controls, applications, and techniques that identify the relative importance
of different datasets, their sensitivity, regulatory compliance requirements and then
applying appropriate protections to secure those resources.
 Traditional data security solutions include encryption, data loss prevention(DLP)
technology, backup and access management technology, and more.
 But frequently overlooked when designing a data security framework is role the application
security can play in protecting data
Needs of data security

 Data security is critical to public and private sector organizations because there’s legal and
moral obligation to protect users and a reputational risk of a data breach.
Tools to secure data

Data needs to be classified in the security policy according to its sensitivity.


 Once this has taken place, the most sensitive data has extra measures in place to safeguard
and ensure its integrity and availability.
 All access to this sensitive data must be logged.
 Secure data is usually isolated from other stored data.

You might also like