Data Security & Protection

Post on 08-Apr-2018

234 views 0 download

Transcript of Data Security & Protection

8/6/2019 Data Security & Protection

http://slidepdf.com/reader/full/data-security-protection 1/13

DATA SECURITY & PROTECTIONINTRODUCTION

Data security and protection is a concern for allorganizations and government parastatal. With

the sophistication and increase in number of security threats, organizations want to gain

control, protection, and visibility over their securitysystems, preventing incidents and threats that o

productivity, impact customer relationships, anderode profits. Government regulations pertainingto the protection of information also add to the

mounting emphasis on data protection.

8/6/2019 Data Security & Protection

http://slidepdf.com/reader/full/data-security-protection 2/13

AIMS AND OBJECTIVES

T he basic aim and objective of the presentationfocuses on the following;

Call to our attention the areas where possiblethreats emanates.

Critically review the dangers.Finally, proffer available solutions to prevent

such threats from.

8/6/2019 Data Security & Protection

http://slidepdf.com/reader/full/data-security-protection 3/13

DATA SECURITY AND PROTECTION

T his generally means the act of ensuring thatcollected private data belonging to aperson/individual, group of person(s), or

organization is safely kept hidden from corruptionand all unauthorized access.T he main focus or aim behind this is to ensureprivacy while protecting personal or corporatedata.

8/6/2019 Data Security & Protection

http://slidepdf.com/reader/full/data-security-protection 4/13

THREATS

T he main threats to data security and protectionto organizations are as follows;

VirusesSpyware/malwareWorms

T rojans

Software vulnerabilities etc.

T he outcome of these and other threats includesthe following;

8/6/2019 Data Security & Protection

http://slidepdf.com/reader/full/data-security-protection 5/13

Unencrypted data in vulnerable location.New types of application-level attacks.Private key mismanagement

Identity and access management risks.(inadequate user authentication andauthorization)Misconfigurations/poor configuration(i.e. human administration errors.).Data lost on a portable device.

8/6/2019 Data Security & Protection

http://slidepdf.com/reader/full/data-security-protection 6/13

EFFECTS OF THESE THREATS

they can destroy files.they can also capture and resend confidential

data to an external address or opencommunication ports.

they can capture keystrokes or recordpasswords entered by users.

they usually saturate computers and networks,preventing them from being used.

degrades system performance.renders the system unstable.

8/6/2019 Data Security & Protection

http://slidepdf.com/reader/full/data-security-protection 7/13

Data security and protection solutionsFew of the solutions to data security andprotection are as follows;Network securityDatabase securityWeb application securityOFF-SITE BACKUP : stores your data at twodifferent places.Local backupEmployer guardFile security

8/6/2019 Data Security & Protection

http://slidepdf.com/reader/full/data-security-protection 8/13

FUNCTIONS OF THE SOLUTIONS

DATABASE SECURITY : this solution providessecurity for sensitive data stored in the databaseproviding visibility into the usage of data andaccess rights and vulnerabilities.

capabilities :Audits all access to sensitive data.Blocks or alerts abnormal access and database

attacks.Identify excessive and dormant user rights to

sensitive data.Detect and patch database software

vulnerabilities.

8/6/2019 Data Security & Protection

http://slidepdf.com/reader/full/data-security-protection 9/13

FILE SECURITYthis solution protects sensitive file data stored on

network attached storage device and file servers.Capabilities :

Identify owners of data.

Block or alert file request that violates corporatepolicies.Accelerates incident response.

Audits all access to file storage devices.

8/6/2019 Data Security & Protection

http://slidepdf.com/reader/full/data-security-protection 10/13

W EB APPLICATION SECURITY: T his solutionprotects web application from online attacks.Capabilities:

Patches application vulnerabilities.Fortifies web defenses.Learns dynamically legitimate web application

usage.Alerts or blocks requests that;

-originates from malicious source-indicates a sophisticated attack-deviates from normal data and application

usage

8/6/2019 Data Security & Protection

http://slidepdf.com/reader/full/data-security-protection 11/13

BENEFITS

Optimized protection against;-Viruses-Malwares/spywares

-T

rojans-Worms etc.Content filtering service that enhances

productivity and increases security.Firewall internet services protection for web, file

transfer, E-mail etc.

8/6/2019 Data Security & Protection

http://slidepdf.com/reader/full/data-security-protection 12/13

CONCLUSSION

With the increasing sophistication in cyber crimeactivities, there has been an increase in datasecurity breach in corporations/organizations andthese vulnerable corporations/organizations are

leaving no stone unturned in finding ways towhich they will safely secure the information of their clientele.

Government are not left alone in this quest asthey work tireless to enact and enforce laws thatcombats these menace.

8/6/2019 Data Security & Protection

http://slidepdf.com/reader/full/data-security-protection 13/13

REFERENCES

www.datasecuritysolutions.netwww.vasco.comwww.microsoft.com/midsizebusiness/security-data-security.mspxwww.24-7-solutions.net/reviews/attacks-kindswww.buzzle.com/articles/types-of-computer-securitywww.imperva.com/products/dsc-datadase-security-and-compliance-overview.htmlwww.bitpipe.com/tlist/data-security.html