Submitted by: Submitted by abcd789
Views: 51
Words: 5972
Pages: 24
Category: Science and Technology
Date Submitted: 02/09/2015 08:17 AM
DATA SECURITY MANAGEMENT
MIS 630
Submitted By: Submitted To:
Amit Khare Professor J. Morabito
TABLE OF CONTENTS
INTRODUCTION……………………………………………………………………………….3
OBJECTIVES……………………………………………………………………………………3
GOALS…………………………………………………………………………………………..4
DATA SECURITY POLICIES………………………………………………………………….7
DATA SECURITY SERVICES…………………………………………………………………7
DATA SECURITY SOFTWARES………………………………………………………...……9
DATA SECURITY PRACTICES………………………………………………………………10
DATA ACCESS………………………………………………………………………………...11
DATA ERASURE………………………………………………………………………………12
PRINCIPLES OF IMPLEMENTATION……………………………………………………….13
TATA CONSULTANCY SERVICES………………………………………………………….15
HEXAWARE TECHNOLOGIES………………………………………………………………17
CONCLUSION………………………………………………………………………………….20
REFRENCES……………………………………………………………………………………21
INTRODUCTION
Data security management is a way to maintain the integrity of data and to make sure that the data is not accessible to unauthorized parties or vulnerable to corruption of. Data security ensures privacy in addition to providing protecting to data. Data itself is a raw form of information that is stored on network servers, possible personal computers and in the form of columns, rows and various other formats. This data can be anything from personal files to intellectual property and even highly confidential information. Data Security Management is the planning, development, and execution of security policies and procedures to provide proper authentication, authorization, access, and auditing of data and information assets. Effective data security policies and procedures ensure that the right people can use and update data in the right way, and that all inappropriate access and update is restricted. Understanding and complying with the privacy and confidentiality interests and needs of all stakeholders is in the best interest of any...