SlideShare a Scribd company logo
Data breaches
• which occur when data is accessed in an unauthorized manner, are a major concern
for organizations of all shapes, sizes and industries.
• Data breaches are attributed to a number of cyber incidents, including the following:
• accidental leaks or exposures
• phishing attacks
• distributed denial-of-service attacks
• physical breaches
• lack of access controls
• backdoors
• Types of data security
• Before an organization can secure data, it has to know what data it has.
• This is where a data inventory --a record of all the data created, used and stored by a
company -- is key. The process starts with data discovery, or learning what and where the
data is.
• Data classification follows, which involves labeling data to make it easier to manage, store
and secure. The four standard data classification categories are as follows:
• public information
• confidential information
• sensitive information
• personal information
Few data security technologies
• Because no single form of data exists, no single magic-bullet technique can
secure all data. A defense-in-depth data security strategy is made up of a
combination of tools, techniques and policies. Must-have data security
technologies include the following:
• Encryption
• Data masking
• Access control
• Data loss prevention (DLP)
• Data backup and resiliency
L1-Introduction to Data Security.pptx models
• Encryption
• Encryption is the process of converting readable plaintext into unreadable ciphertext using an
encryption algorithm, or cipher. If encrypted data is intercepted, it is useless as it cannot be
read or decrypted by anyone who does not have the associated encryption key.
• Symmetric and asymmetric encryption are two commonly used ciphers:
• Symmetric encryption uses a single secret key for both encryption and decryption. The
Advanced Encryption Standard is the most commonly used algorithm in symmetric key
cryptography.
• Asymmetric encryption uses two interdependent keys: a public key to encrypt the data and a
private key to decrypt the data. The Diffie-Hellman key exchange and Rivest-Shamir-Adleman
are two common asymmetric algorithms.
Data masking
• Data masking involves changing data so it cannot be read. Masked data looks similar
to the authentic data set but reveals no sensitive information.
• Legitimate data is replaced so the masked data maintains the characteristics of the
data set as well as referential integrity across systems, thereby ensuring the data is
realistic, irreversible and repeatable.
• Below are some common data masking techniques:
• substitution
• shuffling
• variance
• masking out
• nullifying
Access control
• involves two main processes:
• Authentication is the process of ensuring users are who they say they are.
• Authorization is the process of ensuring authenticated users have access to the necessary data
and resources.
• Authentication and authorization are components of an enterprise identity and access
management (IAM) strategy.
• Other fundamental IAM processes and techniques include multifactor authentication (MFA),
principle of least privilege access, role-based access control and privileged access management.
• Also important is following password hygiene best practices, such as setting minimum password
lengths, requiring unique passwords and considering regular password changes.
Data loss prevention
• An integral tool for any enterprise security strategy is a DLP platform.
• It monitors and analyzes data for anomalies and policy violations.
• Its many features can include data discovery, data inventory, data
classification and analysis of data in motion, at rest and in use.
• Many DLP tools integrate with other technologies, such as SIEM
systems, to create alerts and automated responses.
Data backup
• Data backup involves creating copies of files and databases to a
secondary, and often tertiary and quaternary, location.
• If the primary data fails, is corrupted or gets stolen, a data backup
ensures it can be returned to a previous state rather than be
completely lost.
• Data backup is essential to disaster recovery plans.
Data Security Best Practices
• An organization can take several steps in addition to the data security technologies above to
ensure robust data security management.
• External and internal firewalls: Using external and internal firewalls ensures effective data
protection against malware and other cyberattacks.
• Data security policy: An organization should adopt a clear and comprehensive data security
policy, which should be known by all staff.
• Data backup: Practicing backup of all data ensures the business will continue uninterrupted
in the event of a data breach, software or hardware failure, or any type of data loss. Backup
copies of critical data should be robustly tested to ensure adequate insurance against data
loss. Furthermore, backup files should be subjected to equal security control protocols that
manage access to core primary systems.
• Data security risk assessment: it is prudent to carry out regular assessments of data security
systems to detect vulnerabilities and potential losses in the event of a breach. The
assessment can also detect out-of-date software and any misconfigurations needing redress.
• Quarantine sensitive files: Data security software should be able to frequently categorize
sensitive files and transfer them to a secure location.
• Data file activity monitoring: Data security software should be able to analyze data usage
patterns for all users. It will enable the early identification of any anomalies and possible
risks. Users may be given access to more data than they need for their role in the
organization. The practice is called over-permission, and data security software should be
able to profile user behaviour to match permissions with their behavior.
• Application security and patching: Relates to the practice of updating software to the
latest version promptly as patches or new updates are released.
• Training: Employees should continually be trained on the best practices in data security.
They can include training on password use, threat detection, and social engineering
attacks. Employees who are knowledgeable about data security can enhance the
organization’s role in safeguarding data.

More Related Content

PPTX
Computer security concepts
PPTX
Data Security Management - Data Analytics
PPTX
ISM-CS5750-01.pptx
PPTX
crisc_wk_5.pptx
PPTX
Security & Risk Mgmt_WK1.pptx
PPTX
Security & Risk Mgmt_WK1.pptx
PPT
Lecture data classification_and_data_loss_prevention
PPT
Lecture Data Classification And Data Loss Prevention
Computer security concepts
Data Security Management - Data Analytics
ISM-CS5750-01.pptx
crisc_wk_5.pptx
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
Lecture data classification_and_data_loss_prevention
Lecture Data Classification And Data Loss Prevention

Similar to L1-Introduction to Data Security.pptx models (20)

PPT
Data Classification And Loss Prevention
PPTX
Presentation 10.pptx
PPTX
Lecture one Network Security Introduction.pptx
PPTX
SECURITY AND CONTROL
PPTX
security in is.pptx
PPT
4_25655_SE731_2020_1__2_1_Lecture 2 - Security Requirments.ppt
PPT
4_25655_SE731_2020_1__2_1_Lecture 2 - Security Requirments.ppt
PDF
Introduction to Cybersecurity.pdf
PPTX
Data security
PPT
Information Security Audit and Analysis Module
PPT
Lecture 2 - Security Requirments.ppt
PPTX
17 info sec_ma_imt_27_2_2012
PPTX
Tsc2021 cyber-issues
PPTX
ISBB_Chapter6.pptx
PPTX
Information Security
PPT
Module-1.ppt cryptography and network security
PPTX
IS Chap 1 by whitman chapter 1 pptx.pptx
PPTX
Information security Chap 1 whitman.pptx
PPT
Information Security
PPTX
Privacies are coming
Data Classification And Loss Prevention
Presentation 10.pptx
Lecture one Network Security Introduction.pptx
SECURITY AND CONTROL
security in is.pptx
4_25655_SE731_2020_1__2_1_Lecture 2 - Security Requirments.ppt
4_25655_SE731_2020_1__2_1_Lecture 2 - Security Requirments.ppt
Introduction to Cybersecurity.pdf
Data security
Information Security Audit and Analysis Module
Lecture 2 - Security Requirments.ppt
17 info sec_ma_imt_27_2_2012
Tsc2021 cyber-issues
ISBB_Chapter6.pptx
Information Security
Module-1.ppt cryptography and network security
IS Chap 1 by whitman chapter 1 pptx.pptx
Information security Chap 1 whitman.pptx
Information Security
Privacies are coming
Ad

Recently uploaded (20)

PPTX
bas. eng. economics group 4 presentation 1.pptx
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PPTX
Sustainable Sites - Green Building Construction
PPTX
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
composite construction of structures.pdf
PPTX
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PPTX
Geodesy 1.pptx...............................................
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PPTX
Foundation to blockchain - A guide to Blockchain Tech
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
Construction Project Organization Group 2.pptx
PPTX
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
Structs to JSON How Go Powers REST APIs.pdf
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
PPTX
additive manufacturing of ss316l using mig welding
DOCX
573137875-Attendance-Management-System-original
bas. eng. economics group 4 presentation 1.pptx
Embodied AI: Ushering in the Next Era of Intelligent Systems
Sustainable Sites - Green Building Construction
IOT PPTs Week 10 Lecture Material.pptx of NPTEL Smart Cities contd
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
composite construction of structures.pdf
Infosys Presentation by1.Riyan Bagwan 2.Samadhan Naiknavare 3.Gaurav Shinde 4...
Arduino robotics embedded978-1-4302-3184-4.pdf
Geodesy 1.pptx...............................................
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Foundation to blockchain - A guide to Blockchain Tech
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
Construction Project Organization Group 2.pptx
KTU 2019 -S7-MCN 401 MODULE 2-VINAY.pptx
Model Code of Practice - Construction Work - 21102022 .pdf
Structs to JSON How Go Powers REST APIs.pdf
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
additive manufacturing of ss316l using mig welding
573137875-Attendance-Management-System-original
Ad

L1-Introduction to Data Security.pptx models

  • 1. Data breaches • which occur when data is accessed in an unauthorized manner, are a major concern for organizations of all shapes, sizes and industries. • Data breaches are attributed to a number of cyber incidents, including the following: • accidental leaks or exposures • phishing attacks • distributed denial-of-service attacks • physical breaches • lack of access controls • backdoors
  • 2. • Types of data security • Before an organization can secure data, it has to know what data it has. • This is where a data inventory --a record of all the data created, used and stored by a company -- is key. The process starts with data discovery, or learning what and where the data is. • Data classification follows, which involves labeling data to make it easier to manage, store and secure. The four standard data classification categories are as follows: • public information • confidential information • sensitive information • personal information
  • 3. Few data security technologies • Because no single form of data exists, no single magic-bullet technique can secure all data. A defense-in-depth data security strategy is made up of a combination of tools, techniques and policies. Must-have data security technologies include the following: • Encryption • Data masking • Access control • Data loss prevention (DLP) • Data backup and resiliency
  • 5. • Encryption • Encryption is the process of converting readable plaintext into unreadable ciphertext using an encryption algorithm, or cipher. If encrypted data is intercepted, it is useless as it cannot be read or decrypted by anyone who does not have the associated encryption key. • Symmetric and asymmetric encryption are two commonly used ciphers: • Symmetric encryption uses a single secret key for both encryption and decryption. The Advanced Encryption Standard is the most commonly used algorithm in symmetric key cryptography. • Asymmetric encryption uses two interdependent keys: a public key to encrypt the data and a private key to decrypt the data. The Diffie-Hellman key exchange and Rivest-Shamir-Adleman are two common asymmetric algorithms.
  • 6. Data masking • Data masking involves changing data so it cannot be read. Masked data looks similar to the authentic data set but reveals no sensitive information. • Legitimate data is replaced so the masked data maintains the characteristics of the data set as well as referential integrity across systems, thereby ensuring the data is realistic, irreversible and repeatable. • Below are some common data masking techniques: • substitution • shuffling • variance • masking out • nullifying
  • 7. Access control • involves two main processes: • Authentication is the process of ensuring users are who they say they are. • Authorization is the process of ensuring authenticated users have access to the necessary data and resources. • Authentication and authorization are components of an enterprise identity and access management (IAM) strategy. • Other fundamental IAM processes and techniques include multifactor authentication (MFA), principle of least privilege access, role-based access control and privileged access management. • Also important is following password hygiene best practices, such as setting minimum password lengths, requiring unique passwords and considering regular password changes.
  • 8. Data loss prevention • An integral tool for any enterprise security strategy is a DLP platform. • It monitors and analyzes data for anomalies and policy violations. • Its many features can include data discovery, data inventory, data classification and analysis of data in motion, at rest and in use. • Many DLP tools integrate with other technologies, such as SIEM systems, to create alerts and automated responses.
  • 9. Data backup • Data backup involves creating copies of files and databases to a secondary, and often tertiary and quaternary, location. • If the primary data fails, is corrupted or gets stolen, a data backup ensures it can be returned to a previous state rather than be completely lost. • Data backup is essential to disaster recovery plans.
  • 10. Data Security Best Practices • An organization can take several steps in addition to the data security technologies above to ensure robust data security management. • External and internal firewalls: Using external and internal firewalls ensures effective data protection against malware and other cyberattacks. • Data security policy: An organization should adopt a clear and comprehensive data security policy, which should be known by all staff. • Data backup: Practicing backup of all data ensures the business will continue uninterrupted in the event of a data breach, software or hardware failure, or any type of data loss. Backup copies of critical data should be robustly tested to ensure adequate insurance against data loss. Furthermore, backup files should be subjected to equal security control protocols that manage access to core primary systems. • Data security risk assessment: it is prudent to carry out regular assessments of data security systems to detect vulnerabilities and potential losses in the event of a breach. The assessment can also detect out-of-date software and any misconfigurations needing redress.
  • 11. • Quarantine sensitive files: Data security software should be able to frequently categorize sensitive files and transfer them to a secure location. • Data file activity monitoring: Data security software should be able to analyze data usage patterns for all users. It will enable the early identification of any anomalies and possible risks. Users may be given access to more data than they need for their role in the organization. The practice is called over-permission, and data security software should be able to profile user behaviour to match permissions with their behavior. • Application security and patching: Relates to the practice of updating software to the latest version promptly as patches or new updates are released. • Training: Employees should continually be trained on the best practices in data security. They can include training on password use, threat detection, and social engineering attacks. Employees who are knowledgeable about data security can enhance the organization’s role in safeguarding data.