data security & protection

13
DATA SECURITY & PROTECTION INTRODUCTION Data security and protection is a concern for all organizations and government parastatal. With the sophistication and increase in number of security threats, organizations w ant to gain control, protection, and visibility over their security systems, preventing incid ents and threats that o productivity , impact customer relationships, and erode profits. Government regulations pertaining to the protection of information also add to the mounting emphasis on data protection.

Upload: danny-anosike

Post on 08-Apr-2018

235 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Data Security & Protection

8/6/2019 Data Security & Protection

http://slidepdf.com/reader/full/data-security-protection 1/13

DATA SECURITY & PROTECTIONINTRODUCTION

Data security and protection is a concern for allorganizations and government parastatal. With

the sophistication and increase in number of security threats, organizations want to gain

control, protection, and visibility over their securitysystems, preventing incidents and threats that o

productivity, impact customer relationships, anderode profits. Government regulations pertainingto the protection of information also add to the

mounting emphasis on data protection.

Page 2: Data Security & Protection

8/6/2019 Data Security & Protection

http://slidepdf.com/reader/full/data-security-protection 2/13

AIMS AND OBJECTIVES

T he basic aim and objective of the presentationfocuses on the following;

Call to our attention the areas where possiblethreats emanates.

Critically review the dangers.Finally, proffer available solutions to prevent

such threats from.

Page 3: Data Security & Protection

8/6/2019 Data Security & Protection

http://slidepdf.com/reader/full/data-security-protection 3/13

DATA SECURITY AND PROTECTION

T his generally means the act of ensuring thatcollected private data belonging to aperson/individual, group of person(s), or

organization is safely kept hidden from corruptionand all unauthorized access.T he main focus or aim behind this is to ensureprivacy while protecting personal or corporatedata.

Page 4: Data Security & Protection

8/6/2019 Data Security & Protection

http://slidepdf.com/reader/full/data-security-protection 4/13

THREATS

T he main threats to data security and protectionto organizations are as follows;

VirusesSpyware/malwareWorms

T rojans

Software vulnerabilities etc.

T he outcome of these and other threats includesthe following;

Page 5: Data Security & Protection

8/6/2019 Data Security & Protection

http://slidepdf.com/reader/full/data-security-protection 5/13

Unencrypted data in vulnerable location.New types of application-level attacks.Private key mismanagement

Identity and access management risks.(inadequate user authentication andauthorization)Misconfigurations/poor configuration(i.e. human administration errors.).Data lost on a portable device.

Page 6: Data Security & Protection

8/6/2019 Data Security & Protection

http://slidepdf.com/reader/full/data-security-protection 6/13

EFFECTS OF THESE THREATS

they can destroy files.they can also capture and resend confidential

data to an external address or opencommunication ports.

they can capture keystrokes or recordpasswords entered by users.

they usually saturate computers and networks,preventing them from being used.

degrades system performance.renders the system unstable.

Page 7: Data Security & Protection

8/6/2019 Data Security & Protection

http://slidepdf.com/reader/full/data-security-protection 7/13

Data security and protection solutionsFew of the solutions to data security andprotection are as follows;Network securityDatabase securityWeb application securityOFF-SITE BACKUP : stores your data at twodifferent places.Local backupEmployer guardFile security

Page 8: Data Security & Protection

8/6/2019 Data Security & Protection

http://slidepdf.com/reader/full/data-security-protection 8/13

FUNCTIONS OF THE SOLUTIONS

DATABASE SECURITY : this solution providessecurity for sensitive data stored in the databaseproviding visibility into the usage of data andaccess rights and vulnerabilities.

capabilities :Audits all access to sensitive data.Blocks or alerts abnormal access and database

attacks.Identify excessive and dormant user rights to

sensitive data.Detect and patch database software

vulnerabilities.

Page 9: Data Security & Protection

8/6/2019 Data Security & Protection

http://slidepdf.com/reader/full/data-security-protection 9/13

FILE SECURITYthis solution protects sensitive file data stored on

network attached storage device and file servers.Capabilities :

Identify owners of data.

Block or alert file request that violates corporatepolicies.Accelerates incident response.

Audits all access to file storage devices.

Page 10: Data Security & Protection

8/6/2019 Data Security & Protection

http://slidepdf.com/reader/full/data-security-protection 10/13

W EB APPLICATION SECURITY: T his solutionprotects web application from online attacks.Capabilities:

Patches application vulnerabilities.Fortifies web defenses.Learns dynamically legitimate web application

usage.Alerts or blocks requests that;

-originates from malicious source-indicates a sophisticated attack-deviates from normal data and application

usage

Page 11: Data Security & Protection

8/6/2019 Data Security & Protection

http://slidepdf.com/reader/full/data-security-protection 11/13

BENEFITS

Optimized protection against;-Viruses-Malwares/spywares

-T

rojans-Worms etc.Content filtering service that enhances

productivity and increases security.Firewall internet services protection for web, file

transfer, E-mail etc.

Page 12: Data Security & Protection

8/6/2019 Data Security & Protection

http://slidepdf.com/reader/full/data-security-protection 12/13

CONCLUSSION

With the increasing sophistication in cyber crimeactivities, there has been an increase in datasecurity breach in corporations/organizations andthese vulnerable corporations/organizations are

leaving no stone unturned in finding ways towhich they will safely secure the information of their clientele.

Government are not left alone in this quest asthey work tireless to enact and enforce laws thatcombats these menace.

Page 13: Data Security & Protection

8/6/2019 Data Security & Protection

http://slidepdf.com/reader/full/data-security-protection 13/13

REFERENCES

www.datasecuritysolutions.netwww.vasco.comwww.microsoft.com/midsizebusiness/security-data-security.mspxwww.24-7-solutions.net/reviews/attacks-kindswww.buzzle.com/articles/types-of-computer-securitywww.imperva.com/products/dsc-datadase-security-and-compliance-overview.htmlwww.bitpipe.com/tlist/data-security.html