SlideShare a Scribd company logo
2
Most read
3
Most read
7
Most read
SENSITIVE DATA
181-35-2435
182-35-2532
182-35-2533
182-35-2558
182-35-2560
What Is Sensitive Data?
◦ Sensitive data is data that must be protected against unwanted disclosure. Access to sensitive
data should be safeguarded. Protection of sensitive data may be required for legal or ethical
reasons, for issues pertaining to personal privacy, or for proprietary considerations.
Types Of Sensitive Data
When we say that data is sensitive, then its sensitivity must have levels.
Sensitive data can be classified into four types:
Low data sensitivity type/ public classification
Moderate data sensitivity type or internal classification
High data sensitivity type or confidential classification
Restricted type of sensitive data
Measurement OF DATA SENSITIVITY
There are 3 benchmarks that has to be followed in terms of checking the sensitivity of the data
are okay or not. The key points are given below:
Confidentiality: This part is tied in with preventing unapproved admittance to Sensitive data without
restricting said data for individuals who need to approach it.
Integrity: It is about long-term data consistency and accuracy over a specific period in time.
Availability: It focuses solely on sensitive data being available when needed.
Sensitive data that hackers would look for
If hackers were to gain access to your system in some way, they would like to see these
properties:
 Industry-specific information
 Inventory/operational info
 Trade secrets/Intellectual property.
 Customer information.
 Data of your employees.
How to Protect Sensitive Data
◦ There are 3 key steps to protect data, The steps are given below:
Identify all sensitive data: The first step is to identify and group all the data based on their
sensitivity.
Promptly respond to, and assess data risks: Sensitive data is always targeted by cybercriminals and
when we might have identified such sensitive data, we must assess the risk. Risks such as the liability
cost of the sensitive data, location of these data etc.
Monitor and implement adequate security measures: This process follows the previously listed
steps. This step involves creating viable security measures to safeguard against theft of sensitive data.
Conclusion
As data privacy is becoming increasingly vital in the world, many customers/clients would only
transact and build long-lasting business relationships with organizations that can guarantee the
safety of their data – Especially their sensitive data. Achieving a strong business relationship in
regards to this calls for the application of strong data security measures in order to protect
sensitive data, and prevent its exposure.
THANK YOU

More Related Content

PPTX
User authentication
 
PPTX
Social Media Cyber Security Awareness Briefing
PPT
General Awareness On Cyber Security
PPT
Information security management
PPTX
Cryptography
PDF
Cybersecurity Employee Training
PDF
1. introduction to cyber security
PPTX
Footprinting and reconnaissance
User authentication
 
Social Media Cyber Security Awareness Briefing
General Awareness On Cyber Security
Information security management
Cryptography
Cybersecurity Employee Training
1. introduction to cyber security
Footprinting and reconnaissance

What's hot (20)

PPT
Physical Security
PPT
Information Security Principles - Access Control
PPTX
Cybersecurity 1. intro to cybersecurity
PPTX
Network security
PPTX
Privacy & Data Protection
PPTX
Data security
PPT
Multilevel
PDF
Cyber Security Vulnerabilities
PPTX
Information Security Awareness
PPT
6. cryptography
PDF
Network Security Fundamentals
PPTX
NETWORK SECURITY
PPTX
Information security management system
PPT
Symmetric & Asymmetric Cryptography
PPTX
what is data security full ppt
PPTX
Network security
PPT
SECURITY PROTOCOLS.ppt
PDF
Network security - OSI Security Architecture
PPTX
Network security
PPTX
Cyber Security Awareness Program.pptx
Physical Security
Information Security Principles - Access Control
Cybersecurity 1. intro to cybersecurity
Network security
Privacy & Data Protection
Data security
Multilevel
Cyber Security Vulnerabilities
Information Security Awareness
6. cryptography
Network Security Fundamentals
NETWORK SECURITY
Information security management system
Symmetric & Asymmetric Cryptography
what is data security full ppt
Network security
SECURITY PROTOCOLS.ppt
Network security - OSI Security Architecture
Network security
Cyber Security Awareness Program.pptx
Ad

Similar to Sensitive data (20)

PPTX
Sensitive data - SQL Saturday Tampa
PPTX
Sensitive Data Exposure
PPTX
Sensitive Data1 In Cyber Security .pptx
PPTX
L2 - Protecting Security of Assets_.pptx
PDF
Privacy Management System: Protect Data or Perish
PDF
3 guiding priciples to improve data security
PPTX
Privacy Secrets Your Systems May Be Telling
PPTX
Privacy Secrets Your Systems May Be Telling
DOCX
Data Security
PDF
Bagesh_Data Privacy and Security.pdf
PPTX
New york oracle users group 2013 spring general meeting ulf mattsson
PPTX
CISSP Domain 02 Asset Securitycissp.pptx
PDF
Data security and privacy
PPTX
Data security
PDF
How to protect the cookies once someone gets into the cookie jar
PDF
Isaca new delhi india - privacy and big data
PDF
Where In The World Is Your Sensitive Data?
PPTX
Smart Data Module 5 d drive_legislation
PDF
How to Secure Data Privacy in 2024.pdf
PDF
ISACA Los Angeles 2010 Compliance - Ulf Mattsson
Sensitive data - SQL Saturday Tampa
Sensitive Data Exposure
Sensitive Data1 In Cyber Security .pptx
L2 - Protecting Security of Assets_.pptx
Privacy Management System: Protect Data or Perish
3 guiding priciples to improve data security
Privacy Secrets Your Systems May Be Telling
Privacy Secrets Your Systems May Be Telling
Data Security
Bagesh_Data Privacy and Security.pdf
New york oracle users group 2013 spring general meeting ulf mattsson
CISSP Domain 02 Asset Securitycissp.pptx
Data security and privacy
Data security
How to protect the cookies once someone gets into the cookie jar
Isaca new delhi india - privacy and big data
Where In The World Is Your Sensitive Data?
Smart Data Module 5 d drive_legislation
How to Secure Data Privacy in 2024.pdf
ISACA Los Angeles 2010 Compliance - Ulf Mattsson
Ad

More from S.M. Towhidul Islam (9)

PPTX
Introduction to information security
PPTX
Enterprise resource planning(ERP)
PDF
Endpoint security
PDF
Recent cyber Attacks
PDF
Cryptography
PPTX
Attack types
PPTX
Internal audit
PPTX
Sub-Queries
Introduction to information security
Enterprise resource planning(ERP)
Endpoint security
Recent cyber Attacks
Cryptography
Attack types
Internal audit
Sub-Queries

Recently uploaded (20)

PPTX
Moving the Public Sector (Government) to a Digital Adoption
PDF
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
PDF
Launch Your Data Science Career in Kochi – 2025
PPTX
Business Ppt On Nestle.pptx huunnnhhgfvu
PPTX
1_Introduction to advance data techniques.pptx
PPTX
Database Infoormation System (DBIS).pptx
PPTX
Supervised vs unsupervised machine learning algorithms
PPTX
Global journeys: estimating international migration
PPTX
Business Acumen Training GuidePresentation.pptx
PDF
Foundation of Data Science unit number two notes
PDF
Mega Projects Data Mega Projects Data
PPT
Chapter 2 METAL FORMINGhhhhhhhjjjjmmmmmmmmm
PPTX
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
PDF
Introduction to Business Data Analytics.
PPTX
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
PPTX
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
PPT
Quality review (1)_presentation of this 21
PDF
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
PPT
Chapter 3 METAL JOINING.pptnnnnnnnnnnnnn
Moving the Public Sector (Government) to a Digital Adoption
22.Patil - Early prediction of Alzheimer’s disease using convolutional neural...
Launch Your Data Science Career in Kochi – 2025
Business Ppt On Nestle.pptx huunnnhhgfvu
1_Introduction to advance data techniques.pptx
Database Infoormation System (DBIS).pptx
Supervised vs unsupervised machine learning algorithms
Global journeys: estimating international migration
Business Acumen Training GuidePresentation.pptx
Foundation of Data Science unit number two notes
Mega Projects Data Mega Projects Data
Chapter 2 METAL FORMINGhhhhhhhjjjjmmmmmmmmm
DISORDERS OF THE LIVER, GALLBLADDER AND PANCREASE (1).pptx
Introduction to Business Data Analytics.
iec ppt-1 pptx icmr ppt on rehabilitation.pptx
The THESIS FINAL-DEFENSE-PRESENTATION.pptx
Quality review (1)_presentation of this 21
TRAFFIC-MANAGEMENT-AND-ACCIDENT-INVESTIGATION-WITH-DRIVING-PDF-FILE.pdf
Chapter 3 METAL JOINING.pptnnnnnnnnnnnnn

Sensitive data

  • 2. What Is Sensitive Data? ◦ Sensitive data is data that must be protected against unwanted disclosure. Access to sensitive data should be safeguarded. Protection of sensitive data may be required for legal or ethical reasons, for issues pertaining to personal privacy, or for proprietary considerations.
  • 3. Types Of Sensitive Data When we say that data is sensitive, then its sensitivity must have levels. Sensitive data can be classified into four types: Low data sensitivity type/ public classification Moderate data sensitivity type or internal classification High data sensitivity type or confidential classification Restricted type of sensitive data
  • 4. Measurement OF DATA SENSITIVITY There are 3 benchmarks that has to be followed in terms of checking the sensitivity of the data are okay or not. The key points are given below: Confidentiality: This part is tied in with preventing unapproved admittance to Sensitive data without restricting said data for individuals who need to approach it. Integrity: It is about long-term data consistency and accuracy over a specific period in time. Availability: It focuses solely on sensitive data being available when needed.
  • 5. Sensitive data that hackers would look for If hackers were to gain access to your system in some way, they would like to see these properties:  Industry-specific information  Inventory/operational info  Trade secrets/Intellectual property.  Customer information.  Data of your employees.
  • 6. How to Protect Sensitive Data ◦ There are 3 key steps to protect data, The steps are given below: Identify all sensitive data: The first step is to identify and group all the data based on their sensitivity. Promptly respond to, and assess data risks: Sensitive data is always targeted by cybercriminals and when we might have identified such sensitive data, we must assess the risk. Risks such as the liability cost of the sensitive data, location of these data etc. Monitor and implement adequate security measures: This process follows the previously listed steps. This step involves creating viable security measures to safeguard against theft of sensitive data.
  • 7. Conclusion As data privacy is becoming increasingly vital in the world, many customers/clients would only transact and build long-lasting business relationships with organizations that can guarantee the safety of their data – Especially their sensitive data. Achieving a strong business relationship in regards to this calls for the application of strong data security measures in order to protect sensitive data, and prevent its exposure.