Data at home or within organizations need to be secure to guarantee the privacy of the data and the organization it belongs that owns it. The IT privacy means that only permitted individuals would access the data (Pfleeger, 2012). The data security helps in protecting the data from spreading to unwanted sources where it might be manipulated. There are various techniques through which data can be secured; some of the techniques include disk encryption, software based skills, backups among others (Robling 2012). Disk encryption means the encryption technique, which encrypts data into a hard disk drive. Disc encryption is in the form of a software or a hardware. It is commonly known as the transparent encryption.
The other technique through which data is protected is the hardware and software-based techniques. The software-based mechanism of data protection protects the data from theft. Nevertheless, some programs or hackers could mishandle the data and make it unrecoverable. The system would therefore, be unusable (Kaufman, 2011). The hardware-based security mechanisms could prevent the access to read and write to the data, its security is then considered best as it protects the data strongly against unauthorized access and tampering with the data. The hardware device allows the users to log in through passwords that they have set, it also allows for the change of the passwords hence adequate security guaranteed (Davies, & Price, 2014). The hardware uses biometric technology that governs it from other outside users, the biometric technology allows the authorized users to set and change their passwords at will provided it is convenient with them. The activities of a user are monitored and should a hacker invade the site, appropriate protection action is taken.
The security provided to data by the hard disk is better than that provided by the operating system since hackers and viruses might attack the operating system (Pfleeger, 2012). The hard disk data protection on the other hand, could be corrupted upon attack by hackers and no data would be lost. The other means of data protection is through backups. Backups are commonly used to retrieve lost data from other sources. Backup recommends that data back p is set to an accessible source where it could be accessed cheaply in case data is lost to the hackers or viruses (Kaufman, 2011). Data backup is recommended in most industries and institutions where sensitive processes are involved. The files within the data that might be lost may be very important to the users and the whole institution.
Another technique used in data protection is known as data masking. Data masking refers to obscuring certain data within the database cell to affirm that data security is retained and the sensitive information within the data is protected from unauthorized people (Davies, & Price, 2014). Data masking may include hiding the data from outsourcing vendors, developers and even data users. The other mechanism used in data protection is by the use of data erasure. Data erasure refers to a system whereby a software-based overwriting, which can destroy completely all the residing electronic data within a hard drive. The data erasure might also destroy the electronic data that exists within the digital media so that no sensitive data is leaked in case an asset is used more than once (Robling 2012). In conclusion, data security is a reasonable investment as it would ensure the safety of given data. The entire information technology (IT) sector is secure when the data is protected from hackers and virus.
Reference
Davies, D. W., & Price, W. L. (2014). Security for computer networks: and introduction to data security in teleprocessing and electronic funds transfer. John Wiley & Sons, Inc..
Kaufman, L. M. (2011). Data security in the world of cloud computing. Security & Privacy, IEEE, 7(4), 61-64.
Pfleeger, C. P., & Pfleeger, S. L. (2012). Security in computing. Prentice Hall Professional Technical Reference.
Robling Denning, D. E. (2012). Cryptography and data security. Addison-Wesley Longman Publishing Co., Inc..
If you are the original author of this essay and no longer wish to have it published on the SuperbGrade website, please click below to request its removal:
- Modern Technology in Industrial Fields
- How to Write Code in Two Programms
- Countering Terrorism Within Social Media Platforms in GCC
- The Faces in the Mirror by Ty Burr
- Contrast the Services Provided by the Two Research Firms
- Where Do Innovations Come From?
- What to Do in Case of a Nuclear Attack? - Expository Essay