You are on page 1of 8

COMPUTER SECURITY AND DATA

PROTECTION
DEFINITION
• It is referred to the measures and controls that ensure
confidentiality, integrity and availability of the information
processed and stored by the computer
• It includes protecting physical information assets to data
security and computer safety practices, installation of antivirus
software, generation of passwords also protection of the data
you share online
TYPES OF COMPUTER SECURITY
 Application security
Application security is the process of adding specific features to software that
prevents a variety of cyber threats examples the usage of Two step verification,
high level encryption, logging, firewalls, intrusion prevention systems (IPS) and
more
 Information security
It deals with protection of sensitive information from unauthorized activities
includes inspection, modification, recording and any disruption or destruction
 Network security

is a set of rules and configurations designed to protect the integrity,


confidentiality and accessibility of computer networks and data using
both software and hardware technologies.
 End point security

is the process of protecting devices like desktops, laptops, mobile


phones, and tablets from malicious threats and cyber attacks.
Challenges of computer security
 Cyber attacks and threats
The rapid growth of cybercriminal activity, including malware, ransomware, phishing and other malicious
attacks, poses a constant threat to computer systems, network, data.
 Data breaches and privacy concerns
High-profile data breaches compromise personal information , leading to privacy concerns and potential identity
theft. Regulatory frameworks like GDPR and CCPA impose strict requirements on data protection and privacy.
 Sophisticated Malware
Malware is becoming more complex, stealthy, and adaptable. Advanced persistent threats (APTs) can remain
undetected for extended periods, leading to data breaches and system compromise.
 Insider Threats
Threats from within an organization can be just as damaging as external threats. Employees, contractors, or
partners with access to systems can inadvertently or maliciously cause breaches.
Data protection
It is the process of protecting sensitive information from damage loss or
corruption as the amount of data being created and stored has increased at
an unprecedented rate, making data protection increasingly important
Fundamentals of data protection
 Data
It is referred to as an unprocessed information. It is one of the core components of any information system
 Data protection
It is a set of method and skills used to secure data from unauthorized success
 Data protection policy
This is vital for any organization that collects, handles, or stores sensitive data. It provides guidance that
prevents data loss, theft and corruption and helps to minimize damage caused by a breach or disaster
Importance of data protection
The main importance of data protection is that it is used to
prevent that data from being misused by third parties for
fraud, such as phishing scams and identity theft.

You might also like