SlideShare a Scribd company logo
2
Most read
3
Most read
7
Most read
It’s your data – are you sure it’s safe?
By
Shahbaz khan
Rol Num
0000
AUST
 Data is any type of stored digital information
 Every company needs places to store
institutional knowledge and data.
 Frequently that data contains proprietary
information
 Personally Identifiable Data
 Employee HR Data
 Financial Data
 The security and confidentiality of this data
is of critical importance.
 Data needs to be available at all necessary
times
 Data needs to be available to only the
appropriate users
 Need to be able to track who has access to
and who has accessed what data
 Security is about the protection of
assets.
 Prevention: measures taken to protect
your assets from being damaged.
 Detection: measures taken to allow you
to detect when an asset has been
damaged, how it was damaged and
who damaged it.
 Reaction: measures that allow you to
recover your assets.
 . A security policy is a comprehensive
document that defines a companies’
methods for prevention, detection,
reaction, classification, accountability
of data security practices and
enforcement methods.
 It generally follows industry best
practices as defined by ISO
17799,27001-02, PCI, ITIL, SAS-70,
HIPPA , SOX or a mix of them.
Security Policy
 The security policy is the key document in
effective security practices.
 Once it has been defined it must be
implemented and modified and include any
exceptions that may need to be in place for
business continuity.
 All users need to be trained on these best
practices with continuing education at
regular intervals.
 Data needs to be classified in the security
policy according to its sensitivity.
 Once this has taken place, the most sensitive
data has extra measures in place to
safeguard and ensure its integrity and
availability.
 All access to this sensitive data must be
logged.
 Secure data is usually isolated from other
stored data.
 . Controlling physical access to the data
center or area where the data is stored.
 Active or Open Directory is a centralized
authentication management system that is
available to companies to control and log
access to any data on the system.
 Encryption of the sensitive data is critical
before transmission across public networks
 The use of firewalls on all publicly facing
WAN connections.
 Deploying VLANs’ and ACLs’ to isolate
sensitive departments from the rest of the
network.
 Shutting down unused switch ports.
 If wireless is deployed, use authentication
servers to verify and log the identity of those
logging on.
 Anti-Virus and malicious software protection
on all systems.
 . There are four key issues in the security of
databases just as with all security systems
 Availability
 Authenticity
 Integrity
 Confidentiality
 Data needs to be available at all necessary
times
 Data needs to be available to only the
appropriate users
 Need to be able to track who has access to
and who has accessed what data
 . Need to ensure that the data has been
edited by an authorized source
 Need to confirm that users accessing the
system are who they say they are
 Need to verify that all report requests are
from authorized users
 Need to verify that any outbound data is
going to the expected receiver
 . Need to verify that any external data has
the correct formatting and other metadata
 Need to verify that all input data is accurate
and verifiable
 Need to ensure that data is following the
correct work flow rules for your
institution/corporation
 Need to be able to report on all data changes
and who authored them to ensure
compliance with corporate rules and privacy
laws.
 . Need to ensure that confidential data is
only available to correct people
 Need to ensure that entire database is
security from external and internal system
breaches
 Need to provide for reporting on who has
accessed what data and what they have done
with it
 Mission critical and Legal sensitive data must
be highly security at the potential risk of lost
business and litigation
what is data security full ppt

More Related Content

PPTX
Data security
PPTX
Data security
PPTX
Data security
PPTX
Data Security - English
PPTX
Introduction to Cybersecurity Fundamentals
PPTX
INFORMATION SECURITY
PPTX
System security
PPT
Cyber security & Importance of Cyber Security
Data security
Data security
Data security
Data Security - English
Introduction to Cybersecurity Fundamentals
INFORMATION SECURITY
System security
Cyber security & Importance of Cyber Security

What's hot (20)

PPTX
Data Security
PDF
Data Privacy & Security
PPTX
Network security
PPTX
Data security
PPTX
Data protection ppt
PPTX
Social Engineering new.pptx
PPTX
Cyber Security Awareness
PPTX
Data Privacy Introduction
PPTX
Cybersecurity Awareness Training
PPTX
Data Security Explained
PPTX
Presentation on GDPR
PDF
Data Protection and Privacy
PPT
Data Protection Presentation
PPTX
Introduction to information security
PPS
Introduction to Data Protection and Information Security
PPTX
Data Privacy and Protection Presentation
PPT
Data Classification Presentation
PPTX
Information Security Lecture #1 ppt
PDF
Information Security Awareness Training
PPTX
Data Privacy: What you need to know about privacy, from compliance to ethics
Data Security
Data Privacy & Security
Network security
Data security
Data protection ppt
Social Engineering new.pptx
Cyber Security Awareness
Data Privacy Introduction
Cybersecurity Awareness Training
Data Security Explained
Presentation on GDPR
Data Protection and Privacy
Data Protection Presentation
Introduction to information security
Introduction to Data Protection and Information Security
Data Privacy and Protection Presentation
Data Classification Presentation
Information Security Lecture #1 ppt
Information Security Awareness Training
Data Privacy: What you need to know about privacy, from compliance to ethics
Ad

Viewers also liked (10)

PDF
Privacy in the Age of Big Data
PPTX
Privacy issues and internet privacy
PPT
“Privacy Today” Slide Presentation
PPTX
Internet Privacy
PPTX
Privacy , Security and Ethics Presentation
PPT
Indentify Theft Slide Show
PDF
Data security and Integrity
PDF
Software Security
PPTX
Cyber crime presentation By Vaibhav Gaur
PPT
Identity Theft Presentation
Privacy in the Age of Big Data
Privacy issues and internet privacy
“Privacy Today” Slide Presentation
Internet Privacy
Privacy , Security and Ethics Presentation
Indentify Theft Slide Show
Data security and Integrity
Software Security
Cyber crime presentation By Vaibhav Gaur
Identity Theft Presentation
Ad

Similar to what is data security full ppt (20)

PPT
CompTIA Security+ Module1: Security fundamentals
PDF
Security review using SABSA
PPTX
Introduction to Network Security
DOCX
A network security policy group project unit 4 (1) july 2015
PPTX
Security and Control Issues in Information System
PDF
How to Secure Data Privacy in 2024.pdf
PPTX
How to Secure Data Privacy in 2024.pptx
PDF
Ch06 Policy
DOCX
Cyber_Security_Policy
PPTX
Information security: importance of having defined policy & process
DOCX
Data Security
PPTX
Securing Mobile Healthcare Application
PPTX
Health Informatics- Module 5-Chapter 1.pptx
PDF
Data Security and Compliance in Enterprise Cloud Migration.pdf
PPTX
PDF
Understanding data lineage: Enabling Security Investigations | The Enterprise...
PPTX
Security in electronic health records
PPTX
Module 2 - Information Assurance Concepts.pptx
PPTX
Security in electronic health records
PDF
CS-1,2.pdf
CompTIA Security+ Module1: Security fundamentals
Security review using SABSA
Introduction to Network Security
A network security policy group project unit 4 (1) july 2015
Security and Control Issues in Information System
How to Secure Data Privacy in 2024.pdf
How to Secure Data Privacy in 2024.pptx
Ch06 Policy
Cyber_Security_Policy
Information security: importance of having defined policy & process
Data Security
Securing Mobile Healthcare Application
Health Informatics- Module 5-Chapter 1.pptx
Data Security and Compliance in Enterprise Cloud Migration.pdf
Understanding data lineage: Enabling Security Investigations | The Enterprise...
Security in electronic health records
Module 2 - Information Assurance Concepts.pptx
Security in electronic health records
CS-1,2.pdf

Recently uploaded (20)

PDF
cuic standard and advanced reporting.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Approach and Philosophy of On baking technology
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Machine learning based COVID-19 study performance prediction
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
NewMind AI Monthly Chronicles - July 2025
DOCX
The AUB Centre for AI in Media Proposal.docx
cuic standard and advanced reporting.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Approach and Philosophy of On baking technology
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Dropbox Q2 2025 Financial Results & Investor Presentation
Review of recent advances in non-invasive hemoglobin estimation
Reach Out and Touch Someone: Haptics and Empathic Computing
NewMind AI Weekly Chronicles - August'25 Week I
Per capita expenditure prediction using model stacking based on satellite ima...
Empathic Computing: Creating Shared Understanding
Spectral efficient network and resource selection model in 5G networks
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Machine learning based COVID-19 study performance prediction
Chapter 3 Spatial Domain Image Processing.pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
NewMind AI Monthly Chronicles - July 2025
The AUB Centre for AI in Media Proposal.docx

what is data security full ppt

  • 1. It’s your data – are you sure it’s safe? By Shahbaz khan Rol Num 0000 AUST
  • 2.  Data is any type of stored digital information  Every company needs places to store institutional knowledge and data.  Frequently that data contains proprietary information  Personally Identifiable Data  Employee HR Data  Financial Data  The security and confidentiality of this data is of critical importance.
  • 3.  Data needs to be available at all necessary times  Data needs to be available to only the appropriate users  Need to be able to track who has access to and who has accessed what data
  • 4.  Security is about the protection of assets.  Prevention: measures taken to protect your assets from being damaged.  Detection: measures taken to allow you to detect when an asset has been damaged, how it was damaged and who damaged it.  Reaction: measures that allow you to recover your assets.
  • 5.  . A security policy is a comprehensive document that defines a companies’ methods for prevention, detection, reaction, classification, accountability of data security practices and enforcement methods.  It generally follows industry best practices as defined by ISO 17799,27001-02, PCI, ITIL, SAS-70, HIPPA , SOX or a mix of them. Security Policy
  • 6.  The security policy is the key document in effective security practices.  Once it has been defined it must be implemented and modified and include any exceptions that may need to be in place for business continuity.  All users need to be trained on these best practices with continuing education at regular intervals.
  • 7.  Data needs to be classified in the security policy according to its sensitivity.  Once this has taken place, the most sensitive data has extra measures in place to safeguard and ensure its integrity and availability.  All access to this sensitive data must be logged.  Secure data is usually isolated from other stored data.
  • 8.  . Controlling physical access to the data center or area where the data is stored.  Active or Open Directory is a centralized authentication management system that is available to companies to control and log access to any data on the system.  Encryption of the sensitive data is critical before transmission across public networks
  • 9.  The use of firewalls on all publicly facing WAN connections.  Deploying VLANs’ and ACLs’ to isolate sensitive departments from the rest of the network.  Shutting down unused switch ports.  If wireless is deployed, use authentication servers to verify and log the identity of those logging on.  Anti-Virus and malicious software protection on all systems.
  • 10.  . There are four key issues in the security of databases just as with all security systems  Availability  Authenticity  Integrity  Confidentiality
  • 11.  Data needs to be available at all necessary times  Data needs to be available to only the appropriate users  Need to be able to track who has access to and who has accessed what data
  • 12.  . Need to ensure that the data has been edited by an authorized source  Need to confirm that users accessing the system are who they say they are  Need to verify that all report requests are from authorized users  Need to verify that any outbound data is going to the expected receiver
  • 13.  . Need to verify that any external data has the correct formatting and other metadata  Need to verify that all input data is accurate and verifiable  Need to ensure that data is following the correct work flow rules for your institution/corporation  Need to be able to report on all data changes and who authored them to ensure compliance with corporate rules and privacy laws.
  • 14.  . Need to ensure that confidential data is only available to correct people  Need to ensure that entire database is security from external and internal system breaches  Need to provide for reporting on who has accessed what data and what they have done with it  Mission critical and Legal sensitive data must be highly security at the potential risk of lost business and litigation