SlideShare a Scribd company logo
SECURING DATA
Data security is about achieving 2
somewhat aims. First, its an attempt to
prevent any data being lost
corrupted, which ensures that the
system remains operational. Secondly
it aims to prevent unauthorised access
to the data , completely restricting
unauthorised access by assigning
special levels of permission to each
individual.
Joseph Antoun Year 12 IPT Homework
Back-Up






Making a back-up or recovery is the process of
storing or copying data to another permanent
storage device. (CD, Magnetic Tape)
Recovery of the data would be the opposite
process to which data is retrieved from the
stored location and placed back in the system
Main reason Is preventing data loss in the
event that a event does occur.
Physical Security Measures
Physical Security involves the room which
servers and other system critical devices are
located in an obvious technique for reducing
data loss and unauthorised access.
 Some ideas of implementation may include –
Physical Locks
Security Cameras
Security Guards

Username + Password
Passwords can be used to secure individual
files, or even large storage devices. These
usernames and passwords can be used for
granting the level of access that an individual
has on that system.
 Data secured by passwords is only secure
whilst the password remains secret.
(Aint that obvious Samuel Davis ?)

Encryption & Decryption






Encryption is the process of making data
unreadable by those who don’t possess the
encryption key
Encryption alters the data in such a way to
which is unreadable to the threat.
Decryption is the process of decoding
encrypted data using a key.
Restricting Access using DBMS & Record
locks








The restriction may be implemented through
the level of permissions granted through the
usernames and passwords.
DBMS software retrieves records rather than
files. It locks the Database from edits.
Pessemisitc is when they must wait for the
main user to edit before they can edit
themselves.
Optimistic locking is much more positive. First
user may edit, however another user will
review and determine whether it stays or goes.

More Related Content

PPT
Database Security & Encryption
PPTX
Confidential data storage and deletion
PPTX
Presentation for IT 101
PPT
Cofidential data storage and deletion 2003 (2)
DOCX
Confidential data storage and deletion
PPTX
Data base security & integrity
PDF
Multi-part Dynamic Key Generation For Secure Data Encryption
PDF
Improving data confidentiality in personal computer environment using on line...
Database Security & Encryption
Confidential data storage and deletion
Presentation for IT 101
Cofidential data storage and deletion 2003 (2)
Confidential data storage and deletion
Data base security & integrity
Multi-part Dynamic Key Generation For Secure Data Encryption
Improving data confidentiality in personal computer environment using on line...

What's hot (20)

PPTX
Security and Integrity of Data
PPTX
Data encryption in database management system
PPT
DB security
DOCX
a hybrid cloud approach for secure authorized reduplications
DOCX
INTRODUCTION
PDF
A Secure MSSS Scheme and AES Encryption over Cloud Data
PDF
Security and Integrity
PDF
Encryption technology
PPT
Network Security 2016
PDF
Database security
PDF
Choosing Encryption for Microsoft SQL Server
PPTX
Database Security
PPT
Decentralized access control with anonymous authentication of data stored in ...
DOCX
Secure overlay cloud storage with access
PDF
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
PDF
DATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLE
PPTX
Decentralized access control with authentication anonymous of data stored in ...
DOCX
Identity based secure distributed data storage schemes
DOCX
JPJ1405 Decentralized Access Control With Anonymous Authentication of Data ...
Security and Integrity of Data
Data encryption in database management system
DB security
a hybrid cloud approach for secure authorized reduplications
INTRODUCTION
A Secure MSSS Scheme and AES Encryption over Cloud Data
Security and Integrity
Encryption technology
Network Security 2016
Database security
Choosing Encryption for Microsoft SQL Server
Database Security
Decentralized access control with anonymous authentication of data stored in ...
Secure overlay cloud storage with access
Bio-Cryptography Based Secured Data Replication Management in Cloud Storage
DATABASE PRIVATE SECURITY JURISPRUDENCE: A CASE STUDY USING ORACLE
Decentralized access control with authentication anonymous of data stored in ...
Identity based secure distributed data storage schemes
JPJ1405 Decentralized Access Control With Anonymous Authentication of Data ...
Ad

Similar to Securing data (20)

DOCX
Securing data at rest with encryption
PPTX
Securing data
PPTX
Hsc ipt securing data
PDF
Improve cyber resiliency and protect data from cyber ransomware threats by us...
PDF
CSI-503 - 10. Security & Protection (Operating System)
PPT
UNIT 1 DBMS Security made by me it hrlps you to makr your future bright.ppt
PPTX
Task 1 - Securing Data
PPTX
Database security
PDF
Data security to protect pci data flow ulf mattsson - insecure-mag-40
PPTX
Database security
PPT
Power Point example for module 3 assignment
PPTX
4.-Computer-Security for grade 10 preparation.pptx
PPT
Module 5 security
 
PDF
uu (2).pdf
PDF
5db-security.pdf
PPT
Chap05
PDF
databasesecurit-phpapp01.pdf
PPTX
CSE_Instructor_Materials_Chapter7.pptx
PDF
Big data security_issues_research_paper
PDF
Secure deduplication-evault-endpoint-protection
Securing data at rest with encryption
Securing data
Hsc ipt securing data
Improve cyber resiliency and protect data from cyber ransomware threats by us...
CSI-503 - 10. Security & Protection (Operating System)
UNIT 1 DBMS Security made by me it hrlps you to makr your future bright.ppt
Task 1 - Securing Data
Database security
Data security to protect pci data flow ulf mattsson - insecure-mag-40
Database security
Power Point example for module 3 assignment
4.-Computer-Security for grade 10 preparation.pptx
Module 5 security
 
uu (2).pdf
5db-security.pdf
Chap05
databasesecurit-phpapp01.pdf
CSE_Instructor_Materials_Chapter7.pptx
Big data security_issues_research_paper
Secure deduplication-evault-endpoint-protection
Ad

Recently uploaded (20)

PPTX
20th Century Theater, Methods, History.pptx
PDF
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
B.Sc. DS Unit 2 Software Engineering.pptx
PDF
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
PPTX
Virtual and Augmented Reality in Current Scenario
PPTX
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
PDF
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
PPTX
Computer Architecture Input Output Memory.pptx
PPTX
TNA_Presentation-1-Final(SAVE)) (1).pptx
PDF
HVAC Specification 2024 according to central public works department
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
Empowerment Technology for Senior High School Guide
PDF
Trump Administration's workforce development strategy
PDF
Hazard Identification & Risk Assessment .pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
20th Century Theater, Methods, History.pptx
Vision Prelims GS PYQ Analysis 2011-2022 www.upscpdf.com.pdf
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Weekly quiz Compilation Jan -July 25.pdf
B.Sc. DS Unit 2 Software Engineering.pptx
David L Page_DCI Research Study Journey_how Methodology can inform one's prac...
Virtual and Augmented Reality in Current Scenario
ELIAS-SEZIURE AND EPilepsy semmioan session.pptx
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
Τίμαιος είναι φιλοσοφικός διάλογος του Πλάτωνα
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Computer Architecture Input Output Memory.pptx
TNA_Presentation-1-Final(SAVE)) (1).pptx
HVAC Specification 2024 according to central public works department
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Empowerment Technology for Senior High School Guide
Trump Administration's workforce development strategy
Hazard Identification & Risk Assessment .pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)

Securing data

  • 1. SECURING DATA Data security is about achieving 2 somewhat aims. First, its an attempt to prevent any data being lost corrupted, which ensures that the system remains operational. Secondly it aims to prevent unauthorised access to the data , completely restricting unauthorised access by assigning special levels of permission to each individual. Joseph Antoun Year 12 IPT Homework
  • 2. Back-Up    Making a back-up or recovery is the process of storing or copying data to another permanent storage device. (CD, Magnetic Tape) Recovery of the data would be the opposite process to which data is retrieved from the stored location and placed back in the system Main reason Is preventing data loss in the event that a event does occur.
  • 3. Physical Security Measures Physical Security involves the room which servers and other system critical devices are located in an obvious technique for reducing data loss and unauthorised access.  Some ideas of implementation may include – Physical Locks Security Cameras Security Guards 
  • 4. Username + Password Passwords can be used to secure individual files, or even large storage devices. These usernames and passwords can be used for granting the level of access that an individual has on that system.  Data secured by passwords is only secure whilst the password remains secret. (Aint that obvious Samuel Davis ?) 
  • 5. Encryption & Decryption    Encryption is the process of making data unreadable by those who don’t possess the encryption key Encryption alters the data in such a way to which is unreadable to the threat. Decryption is the process of decoding encrypted data using a key.
  • 6. Restricting Access using DBMS & Record locks     The restriction may be implemented through the level of permissions granted through the usernames and passwords. DBMS software retrieves records rather than files. It locks the Database from edits. Pessemisitc is when they must wait for the main user to edit before they can edit themselves. Optimistic locking is much more positive. First user may edit, however another user will review and determine whether it stays or goes.