Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
33 views

Data Security & Protection

Uploaded by

Danny Anosike
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views

Data Security & Protection

Uploaded by

Danny Anosike
Copyright
© Attribution Non-Commercial (BY-NC)
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 13

DATA SECURITY & PROTECTION

INTRODUCTION
Data security and protection is a concern for all
organizations and government parastatal. With
the sophistication and increase in number of
security threats, organizations want to gain
control, protection, and visibility over their security
systems, preventing incidents and threats that o
productivity, impact customer relationships, and
erode profits. Government regulations pertaining
to the protection of information also add to the
mounting emphasis on data protection.
AIMS AND OBJECTIVES
The basic aim and objective of the presentation
focuses on the following;
•Call to our attention the areas where possible
threats emanates.
•Critically review the dangers.
•Finally, proffer available solutions to prevent
such threats from.
DATA SECURITY AND PROTECTION
This generally means the act of ensuring that
collected private data belonging to a
person/individual, group of person(s), or
organization is safely kept hidden from corruption
and all unauthorized access.
The main focus or aim behind this is to ensure
privacy while protecting personal or corporate
data.
THREATS
The main threats to data security and protection
to organizations are as follows;
•Viruses
•Spyware/malware
•Worms
•Trojans
•Software vulnerabilities etc.

The outcome of these and other threats includes


the following;
• Unencrypted data in vulnerable location.
• New types of application-level attacks.
• Private key mismanagement
• Identity and access management risks.
(inadequate user authentication and
authorization)
• Misconfigurations/poor configuration
(i.e. human administration errors.).
• Data lost on a portable device.
EFFECTS OF THESE THREATS
•they can destroy files.
•they can also capture and resend confidential
data to an external address or open
communication ports.
•they can capture keystrokes or record
passwords entered by users.
•they usually saturate computers and networks,
preventing them from being used. 
•degrades system performance.
•renders the system unstable.
Data security and protection solutions
Few of the solutions to data security and
protection are as follows;
Network security
Database security
Web application security
OFF-SITE BACKUP: stores your data at two
different places.
Local backup
Employer guard
File security
FUNCTIONS OF THE SOLUTIONS
DATABASE SECURITY: this solution provides
security for sensitive data stored in the database
providing visibility into the usage of data and
access rights and vulnerabilities.
capabilities:
•Audits all access to sensitive data.
•Blocks or alerts abnormal access and database
attacks.
•Identify excessive and dormant user rights to
sensitive data.
•Detect and patch database software
vulnerabilities.
FILE SECURITY
this solution protects sensitive file data stored on
network attached storage device and file servers.
Capabilities:
•Identify owners of data.
•Block or alert file request that violates corporate
policies.
•Accelerates incident response.
•Audits all access to file storage devices.
WEB APPLICATION SECURITY: This solution
protects web application from online attacks.
Capabilities:
•Patches application vulnerabilities.
•Fortifies web defenses.
•Learns dynamically legitimate web application
usage.
•Alerts or blocks requests that;
-originates from malicious source
-indicates a sophisticated attack
-deviates from normal data and application
BENEFITS
•Optimized protection against;
-Viruses
-Malwares/spywares
-Trojans
-Worms etc.
•Content filtering service that enhances
productivity and increases security.
•Firewall internet services protection for web, file
transfer, E-mail etc.
CONCLUSSION
With the increasing sophistication in cyber crime
activities, there has been an increase in data
security breach in corporations/organizations and
these vulnerable corporations/organizations are
leaving no stone unturned in finding ways to
which they will safely secure the information of
their clientele.
Government are not left alone in this quest as
they work tireless to enact and enforce laws that
combats these menace.
REFERENCES
www.datasecuritysolutions.net
www.vasco.com
www.microsoft.com/midsizebusiness/security-
data-security.mspx
www.24-7-solutions.net/reviews/attacks-kinds
www.buzzle.com/articles/types-of-computer-
security
www.imperva.com/products/dsc-datadase-
security-and-compliance-overview.html
www.bitpipe.com/tlist/data-security.html

You might also like