Data Security

Submitted by: Submitted by

Views: 444

Words: 2031

Pages: 9

Category: Business and Industry

Date Submitted: 12/04/2010 06:10 PM

Report This Essay

Data Security

Data is a collection of facts such as values or measurements. Distinct pieces of information usually formatted in a special way are called data. Data can exist in a variety of forms -- as numbers or text on pieces of paper, as bits and bytes stored in electronic memory, or as facts stored in a person's mind. Data is the plural of datum, a single piece of information. In practice, however, people use data as both the singular and plural form of the word. Data security is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. Thus data security helps to ensure privacy. It also helps in protecting personal data .Organizations hold personal data about learners, staff and other people to help them conduct their day-to-day activities. Some of this data could be used by another person or criminal organization to cause harm or distress to an individual. The loss of personal data could result in adverse media coverage, and could potentially damage the reputation of an organization. This can make it more difficult for the organization to use technology to benefit learners.

A threat is defined as a computer program, a person, or an event that violates the security system. A threat causes loss of data and attacks the data privacy. Most of the data of an organization stored inside the computer is very important and more valuable than the computer hardware and software. It can be damaged due to many reasons. One must protect his or her data from illegal access or from damage. When discussing attacks and mitigating technologies, a distinction is often made between whether the threat is from a malicious insider or an outside attacker. Malicious insiders have capabilities that outsiders typically do not have. The insider may be able to legitimately log on to the computer using their own account and may be more likely to succeed in obtaining other user’s passwords through social engineering attacks. Moreover, the...