Share to: share facebook share twitter share wa share telegram print page

Data security

Data security means protecting digital data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users,[1] such as a cyberattack or a data breach.[2]

Technologies

Disk encryption

Disk encryption refers to encryption technology that encrypts data on a hard disk drive. [3] Disk encryption typically takes form in either software (see disk encryption software) or hardware (see disk encryption hardware). Disk encryption is often referred to as on-the-fly encryption (OTFE) or transparent encryption.

Software versus hardware-based mechanisms for protecting data

Software-based security solutions encrypt the data to protect it from theft. However, a malicious program or a hacker could corrupt the data to make it unrecoverable, making the system unusable. Hardware-based security solutions prevent read and write access to data, which provides very strong protection against tampering and unauthorized access.

Hardware-based security or assisted computer security offers an alternative to software-only computer security. Security tokens such as those using PKCS#11 or a mobile phone may be more secure due to the physical access required in order to be compromised.[4] Access is enabled only when the token is connected and the correct PIN is entered (see two-factor authentication). However, dongles can be used by anyone who can gain physical access to it. Newer technologies in hardware-based security solve this problem by offering full proof of security for data.[5]

Working off hardware-based security: A hardware device allows a user to log in, log out and set different levels through manual actions. The device uses biometric technology to prevent malicious users from logging in, logging out, and changing privilege levels. The current state of a user of the device is read by controllers in peripheral devices such as hard disks. Illegal access by a malicious user or a malicious program is interrupted based on the current state of a user by hard disk and DVD controllers making illegal access to data impossible. Hardware-based access control is more secure than the protection provided by the operating systems as operating systems are vulnerable to malicious attacks by viruses and hackers. The data on hard disks can be corrupted after malicious access is obtained. With hardware-based protection, the software cannot manipulate the user privilege levels. A hacker or a malicious program cannot gain access to secure data protected by hardware or perform unauthorized privileged operations. This assumption is broken only if the hardware itself is malicious or contains a backdoor.[6] The hardware protects the operating system image and file system privileges from being tampered with. Therefore, a completely secure system can be created using a combination of hardware-based security and secure system administration policies.

Backups

Backups are used to ensure data that is lost can be recovered from another source. It is considered essential to keep a backup of any data in most industries and the process is recommended for any files of importance to a user.[7]

Data masking

Data masking of structured data is the process of obscuring (masking) specific data within a database table or cell to ensure that data security is maintained and sensitive information is not exposed to unauthorized personnel.[8] This may include masking the data from users (for example so banking customer representatives can only see the last four digits of a customer's national identity number), developers (who need real production data to test new software releases but should not be able to see sensitive financial data), outsourcing vendors, etc.[9]

Data erasure

Data erasure is a method of software-based overwriting that completely wipes all electronic data residing on a hard drive or other digital media to ensure that no sensitive data is lost when an asset is retired or reused. [10]

International laws and standards

International laws

In the UK, the Data Protection Act is used to ensure that personal data is accessible to those whom it concerns, and provides redress to individuals if there are inaccuracies.[11] This is particularly important to ensure individuals are treated fairly, for example for credit checking purposes. The Data Protection Act states that only individuals and companies with legitimate and lawful reasons can process personal information and cannot be shared. Data Privacy Day is an international holiday started by the Council of Europe that occurs every January 28. [12]

Since the General Data Protection Regulation (GDPR) of the European Union (EU) became law on May 25, 2018, organizations may face significant penalties of up to €20 million or 4% of their annual revenue if they do not comply with the regulation.[13] It is intended that GDPR will force organizations to understand their data privacy risks and take the appropriate measures to reduce the risk of unauthorized disclosure of consumers’ private information. [14]

International standards

The international standards ISO/IEC 27001:2013 and ISO/IEC 27002:2013 cover data security under the topic of information security, and one of its cardinal principles is that all stored information, i.e. data, should be owned so that it is clear whose responsibility it is to protect and control access to that data.[15][16] The following are examples of organizations that help strengthen and standardize computing security:

The Trusted Computing Group is an organization that helps standardize computing security technologies.

The Payment Card Industry Data Security Standard (PCI DSS) is a proprietary international information security standard for organizations that handle cardholder information for the major debit, credit, prepaid, e-purse, automated teller machines, and point of sale cards.[17]

The General Data Protection Regulation (GDPR) proposed by the European Commission will strengthen and unify data protection for individuals within the EU, whilst addressing the export of personal data outside the EU.

Safeguards

The four types of technical safeguards are access controls, flow controls, inference controls, and data encryption. Access controls manage user entry and data manipulation, while flow controls regulate data dissemination. Inference controls prevent deduction of confidential information from statistical databases and data encryption prevents unauthorized access to confidential information.[18]

See also

References

  1. ^ Summers, G. (2004). Data and databases. In: Koehne, H Developing Databases with Access: Nelson Australia Pty Limited. p4-5.
  2. ^ "Knowing Your Data to Protect Your Data". IT Business Edge. 2017-09-25. Retrieved 2022-11-03.
  3. ^ "Full disk encryption (FDE)". encyclopedia.kaspersky.com. Retrieved 2022-11-03.
  4. ^ Thanh, Do van; Jorstad, Ivar; Jonvik, Tore; Thuan, Do van (2009). "Strong authentication with mobile phone as security token". 2009 IEEE 6th International Conference on Mobile Adhoc and Sensor Systems. pp. 777–782. doi:10.1109/MOBHOC.2009.5336918. ISBN 978-1-4244-5114-2. S2CID 5470548.
  5. ^ Stubbs, Rob (Sep 10, 2019). "Why the World is Moving to Hardware-Based Security". Fortanix. Retrieved 30 September 2022.
  6. ^ Waksman, Adam; Sethumadhavan, Simha (2011), "Silencing Hardware Backdoors" (PDF), Proceedings of the IEEE Symposium on Security and Privacy, Oakland, California, archived (PDF) from the original on 2013-09-28
  7. ^ "Back-ups | Stay Smart Online". Archived from the original on 2017-07-07.
  8. ^ "Data Masking Definition". Archived from the original on 2017-02-27. Retrieved 1 March 2016.
  9. ^ "data masking". Archived from the original on 5 January 2018. Retrieved 29 July 2016.
  10. ^ Michael Wei; Laura M. Grupp; Frederick E. Spada; Steven Swanson (2011). "Reliably Erasing Data From Flash-Based Solid State Drives". FAST'11: Proceedings of the 9th USENIX conference on File and storage technologies. Wikidata Q115346857. Retrieved 2022-11-22.
  11. ^ "data protection act". Archived from the original on 13 April 2016. Retrieved 29 July 2016.
  12. ^ Peter Fleischer, Jane Horvath, Shuman Ghosemajumder (2008). "Celebrating data privacy". Google Blog. Archived from the original on 20 May 2011. Retrieved 12 August 2011.{{cite web}}: CS1 maint: multiple names: authors list (link)
  13. ^ "GDPR Penalties". Archived from the original on 2018-03-31.
  14. ^ "Detect and Protect for Digital Transformation". Informatica. Retrieved 27 April 2018.
  15. ^ "ISO/IEC 27001:2013". ISO. 16 December 2020. Retrieved 2022-11-03.
  16. ^ "ISO/IEC 27002:2013". ISO. 15 April 2021. Retrieved 2022-11-03.
  17. ^ "PCI DSS Definition". Archived from the original on 2 March 2016. Retrieved 1 March 2016.
  18. ^ Denning, Dorothy E., and Peter J. Denning. "Data security." ACM computing surveys (CSUR) 11.3 (1979): 227-249.

External links

Read other articles:

John Wilkins Información personalNacimiento 14 de febrero de 1614 Fawsley (Reino de Inglaterra) Fallecimiento 19 de noviembre de 1672 (58 años)Londres (Reino de Inglaterra) Sepultura St. Lawrence Jewry Nacionalidad InglesaReligión Anglicanismo EducaciónEducado en Magdalen College Información profesionalOcupación Criptógrafo, matemático, sacerdote, filósofo, astrónomo, científico, teólogo, apicultor, ideolingüista, naturalista y escritor Área Filosofía de la ciencia, lexicografía,…

La poule A de la Coupe du monde de rugby à XV 2023, qui se dispute en France du 8 septembre au 28 octobre 2023, comprend cinq équipes dont les deux premières se qualifient pour les quarts de finale de la compétition. Conformément au tirage au sort effectué le 14 décembre 2020 à Paris[1], les équipes de Nouvelle-Zélande (Chapeau 1), de France (Chapeau 2), d'Italie (Chapeau 3), de l'Uruguay (Chapeau 4) et de Namibie (Chapeau 5) composent ce groupe A[2]. Classement Classement Rang Pays J …

Yeremia 15Kitab Yeremia dalam Alkitab Ibrani, MS Sassoon 1053, foto 283-315.KitabKitab YeremiaKategoriNevi'imBagian Alkitab KristenPerjanjian LamaUrutan dalamKitab Kristen24← pasal 14 pasal 16 → Yeremia 15 adalah bagian dari Kitab Yeremia dalam Alkitab Ibrani dan Perjanjian Lama di Alkitab Kristen. Berisi perkataan nabi Yeremia bin Hilkia, tentang Yehuda dan Yerusalem, yang hidup pada zaman raja Yosia, Yoahas, Yoyakim, Yoyakhin dan Zedekia dari Kerajaan Yehuda sekitar abad ke-7 SM.&#…

Halaman ini berisi artikel tentang sejarah Poso sebelum tahun 1959. Untuk sejarah Poso setelah bergabung dengan Indonesia, lihat Sejarah Kabupaten Poso. Garis waktu Kabupaten Poso Poso di bawah kekuasaan Luwu (1600—1897) Afdeling Poso (1919—1942; 1946—1948) Afdeling Poso (1942—1945) Afdeling Poso (1948—1949) Daerah Otonom Poso (1949—1959) Kabupaten Poso (1959—sekarang) Sejarah Poso (bahasa Inggris: History of Poso) dimulai sejak zaman batu hingga zaman megalitikum. Wilayah ini …

Winglet pada sayap Airbus A319 Perbandingan garis vortisitas ujung sayap (wingtip vortices) di sayap konvensional (kiri) dengan sayap dengan winglet (kanan) Perangkat ujung sayap atau Wingtip device biasanya dimaksudkan untuk meningkatkan efisiensi pesawat sayap tetap.[1] Ada beberapa jenis perangkat ujung sayap, dan meskipun mereka berfungsi dengan cara yang berbeda, efek yang diinginkan selalu untuk mengurangi drag pesawat oleh pemulihan parsial dari ujung energi vortex. Perangkat ujun…

Roger Olmos Roger Olmos en 2014Información personalNombre de nacimiento Roger Olmos PastorNacimiento 23 de diciembre 1975 (47 años) Barcelona, EspañaResidencia BarcelonaNacionalidad españolInformación profesionalOcupación ilustradorAños activo 1999 - presenteSitio web http://rogerolmos.blogspot.it/ www.behance.net/rogerolmos, http://rogerolmos.blogspot.itDistinciones Premio Lazarillo[editar datos en Wikidata] Roger Olmos Pastor (Barcelona, 23 de diciembre 1975) es un ilustr…

Wapen van de graven van Oettingen, Siebmachers Wappenbuch, 1605 Wapen van de graven van Oettingen, Scheibelers Wappenbuch, 1450-1480 Kaart van Oettingen-Oettingen, Oettingen-Baldern, Oettimgen-Spielberg en Oettingen-Wallerstein Het graafschap Oettingen was een tot de Zwabische Kreits behorend graafschap binnen het Heilige Roomse Rijk, met als centrum Oettingen in Bayern. Oettingen tot 1557 De graven in de Riesgau noemden zich sinds 1141/3 graaf van Oettingen. Zij verwerven in 1250 Baldern (nu in…

東京都の超高層建築物・構築物の一覧(とうきょうとのちょうこうそうけんちくぶつ・こうちくぶつのいちらん)では、東京都にある高さ170メートル以上(日本の法令上は高さ60メートル以上(建築基準法第20条第1号より[1])だが、例が多くなるため閾値を上げている)の超高層建築物と構築物の一覧を示す。高さは尖塔を含みアンテナマストは含まない(比較のた

Brunó Ferenc Straub 6° Presidente del Consejo Presidencial de la República Popular Húngara 29 de junio de 1988-18 de octubre de 1989Predecesor Károly NémethSucesor Mátyás Szűrös Información personalNombre en húngaro Straub Ferenc Brunó Nacimiento 5 de enero de 1914Nagyvárad,  Imperio austrohúngaro (Ahora Oradea, Rumania)Fallecimiento 15 de febrero de 1996 (82 años)Budapest, Hungría HungríaSepultura Cementerio de Farkasrét Nacionalidad HúngaraLengua materna Hún…

  Ardisia elliptica TaxonomíaReino: Plantae(sin rango): Eudicotyledoneae(sin rango): AstéridasOrden: EricalesFamilia: MyrsinaceaeGénero: ArdisiaEspecie: A. ellipticaThunb.Sinonimia Ardisia solanacea Roxb. Ardisia humilis Vahl. [editar datos en Wikidata] Ardisia elliptica es un árbol de hoja perenne, también conocido como ardisia china o mora botón , nativo de la costa oeste de India, Sri Lanka, Indochina, Malasia, Indonesia y Nueva Guinea. Se trata de un reproductor prolífi…

Castillo de Alfofra Bien de interés culturalPatrimonio histórico de España LocalizaciónPaís España EspañaComunidad Comunidad Valenciana Comunidad ValencianaProvincia AlicanteAlicanteLocalidad ConfridesDatos generalesCódigo RI-51-0011105Declaración 25 de junio de 1985Estilo arquitectura medieval[editar datos en Wikidata] Vista del castillo desde Confrides. El castillo de Alfofra es un castillo del siglo XIII que se alza en el término municipal de Confr…

ماسامي فوكوشيما (باليابانية: 福島正実)‏    معلومات شخصية الميلاد 18 فبراير 1929(1929-02-18)يوكوهاما  تاريخ الوفاة 9 أبريل 1976 (47 سنة) مواطنة اليابان  الحياة العملية المدرسة الأم جامعة نيهون  المهنة لغوي،  ومحرر،  ومترجم،  وكاتب خيال علمي  اللغات اليابانية  تعديل…

Politische Gemeinden des Kantons Luzern Der Kanton Luzern umfasst 80 politische Gemeinden, die Einwohnergemeinden genannt werden (Stand: 1. Januar 2021). Siehe auch: Wahlkreise des Kantons Luzern und Gemeindefusionen im Kanton Luzern Bemerkung zu den Tabellen: Angaben der Fläche gemäss LUSTAT Statistik Luzern,[1] ausser der Angabe für die Stadt Luzern (Fusion mit Littau per 1. Januar 2010), jeweils ohne Seen. Inhaltsverzeichnis A B C D E F G H I J K L M N O P Q R S T U V W X…

Ne doit pas être confondu avec automotrice (SNCF). Un élément automoteur électrique (ici un Z 5300 à quatre caisses) de la SNCF (France) Cette page liste les éléments automoteurs électriques (EAE) de la Société nationale des chemins de fer français (SNCF). Liste des EAE en service Article détaillé : Matériel moteur de la SNCF. Pour troisième rail    Série       Construction       Puissance  …

Coordenadas: 44° 42' 2 N 75° 28' 52 O Ogdensburg Localidade dos Estados Unidos Ogdensburg Localização de Ogdensburg em Nova Iorque Ogdensburg Localização de Ogdensburg nos Estados Unidos Dados gerais Fundado em 1749 Localização 44° 42' 2 N 75° 28' 52 O Condado Condado de St. Lawrence Estado  Nova Iorque Tipo de localidade Cidade Características geográficas Área 12,8 km² População (2020) 10 064 hab. (786 hab./km²) Portal Estados Unidos Og…

1984 single by GenesisTaking It All Too HardSingle by Genesisfrom the album Genesis B-sideSilver RainbowReleasedJune 1984 (1984-06)Length3:56LabelAtlanticSongwriter(s)Tony Banks, Phil Collins, Mike RutherfordProducer(s)Genesis, Hugh PadghamGenesis singles chronology Illegal Alien (1984) Taking It All Too Hard (1984) Invisible Touch (1986) Taking It All Too Hard is the sixth track from the 1983 album Genesis by Genesis. It is known for Tony Banks' work on his Yamaha CP-70 electric piano…

Bài viết này có nhiều vấn đề. Xin vui lòng giúp đỡ cải thiện nó hoặc thảo luận về những vấn đề này trên trang thảo luận. Bài viết này cần thêm chú thích nguồn gốc để kiểm chứng thông tin. Mời bạn giúp hoàn thiện bài viết này bằng cách bổ sung chú thích tới các nguồn đáng tin cậy. Các nội dung không có nguồn có thể bị nghi ngờ và xóa bỏ. (tháng 11/2023) Bài viết này có một danh s

Heinrich Geissler. Heinrich Geissler (1815-1879) adalah seorang ahli mesin, ahli fisika, dan peniup kaca berkebangsaan Jerman.[1] Ia dilaihirkan di kota Ingelshieb, German.[2] Ayahnya adalah seorang pengrajin kaca.[2] Ia memulai bengkel kerjanya di Bonn pada tahun 1852, pada tahun yang sama pula, Geissler bertemu dengan rekan kerjanya, Julius Plücker, seorang ahli matematika dan fisika.[2] Bersama dengan Plucker, Geissler mengerjakan termometer dan tube kapiler.&…

إبراهيم باشا السلحدار (بالتركية العثمانية: سلحدار ابراهيم پاشا)‏  معلومات شخصية مواطنة الدولة العثمانية  مناصب والي مصر   في المنصب1622  – 1623  ببر محمد باشا  قره مصطفى باشا  الحياة العملية المهنة سياسي  اللغات العثمانية  تعديل مصدري - تعديل   إبراهيم ب…

Book by Kingsley Amis This article does not cite any sources. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: The Book of Bond – news · newspapers · books · scholar · JSTOR (April 2019) (Learn how and when to remove this template message) The Book of Bond First editionAuthorKingsley AmisCountryUnited KingdomLanguageEnglishGenreComedy Self-parodyPublisherJonathan CapeP…

Kembali kehalaman sebelumnya

Lokasi Pengunjung: 18.216.105.248