0% found this document useful (0 votes)
14 views15 pages

Business Data Security Guide

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views15 pages

Business Data Security Guide

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 15

INFORMATION SECURITY

& PRIVACY

PRESENTED BY : 20761556-035
20761556-024
20761556-010
Information Security

 Data security is basically the process of keeping certain


information private.

 It involves the use of various methods to make sure that data is


kept confidential and safe.

 Data security ensure the integrity and the privacy of data, as


well as preventing the loss or corruption of data.
Needs of Information Security

 Many businesses hold very important and confidential data

 Hence security of data is extremely important

 Data must be safeguarded all the time


Principles

 Confeditionality
 Integrity
 Availaibility
Ways TO Protect Data(Privacy)
Ways TO Protect
Data(Privacy)
Backups

 A master file stores the static data(dose not change


frequently) found on the database

 The transaction file keeps track of all the changes


made to the database throughout the day

 At the end of the day, all the contents stored in the


transaction file are transferred to the master file in
order to update it
Physical Security

 The most obvious choice of protecting data is to keep it in a


safe locked room/building

 Protected room can be safeguarded by


 A lock and key
 ID card scanning
 Biometrics
 Using a safe
 Alarm systems
Software Safeguards

 There are many software measures which can protect data.

 The following explains some of the most common approaches


used now days
 IDS(Intrusion Detection System)
 User Id (user identification)
 Encryption
 Digital Signature
Information Privacy

 Data privacy, also called information privacy, is the aspect of information


technology (IT) that deals with the ability an organization or individual
has to determine what data in a computer system can be shared with third
parties.
 Data Encryption
 Data anonymization
 Access controls
 Privacy polices
Software Privacy

 Software privacy is also important as it stops


 End to end encryption
 Distribution
 Unauthorized use of computer software
 It is illegal to use private software yourself, to give it away, or
worse yet to sell it.
Soft-lifting

 Soft-lifting is when people buy software with a single license


and install it on more than one PC

Downloading
 Downloading a software from internet is much quicker and
easier than buying it and installing it.
Copyright

 Copyright is a protection that covers published and


unpublished
 Literary
 Scientific
 Artistic work

 Copyright laws grant only creator the right to reproduce,


prepare derivative works , distribution, perform and display the
work publicly
Software Protection

 Software developers try to protect their


software by using many different protection
measures

 Serial numbers
 Activations keys
 CD copy protection
 Hardware keys
Access rights

 Access rights control whether or not a particular user can use


or edit a program or a data file.
 Each user is assigned different rights which determine the file
that can be accessed . A user may allow a complete access to a
file or a restricted only to read the data or have no access at all.
 Network operating system provides a way of identifying
individuals .
Thank you…

You might also like