Security of Data | Data Loss Prevention | How to do security of information?
What Is Security?
Security is a system that is used to protect a computer system and data. It protects from voluntary or accidental damage or access by unauthorized persons. A computer can detect whether the user is authorized or not.
Controlling Access For security of information
Four different means of controlling access to the computer are as follows:
What you have: The user may have a key, badge, token, or plastic card to get physical access to the server room or computer building. Some organizations use active badge. It is an identification card that contains an embedded computer chip. It signals the user’s location via radio waves that are read by sensors in the building.
What you know: The user may have to enter the user ID and password or special number to login to the machine.
What you do: The user may enter signatures on the documents to confirm that they are authorized, users.
What you are: A user may be checked through bio-metrics. It is a means of biological identification such as fingerprints, voice recognition, eye retina, etc.
Security of Security
The protection of data is called data security. Data stored in computers can be lost due to different reasons. It can be lost accidentally or someone can damage it. Data can be lost completely or partially. Data is more valuable and important than the computer itself. It should be saved in such a way that it may not be lost be damaged.
Some organizations obtain data from the users and store data online to provide fast services.
Some examples are as follows:
· A credit card company may store data of its customers online
· A bank may provide online services using online data storage for the records.
· A university may provide the facility of online results.
The organization collecting the data is responsible for the security of data. The User can prosecute against the organization if there is any problem in data security.
Security of Information
"Information Security is the process of protecting the intellectual property of an organisation." (Pipkin, 2000)


Comments
Post a Comment