Preview

Data protection and security

Satisfactory Essays
Open Document
Open Document
343 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data protection and security
Data protection & security What is Data Protection and Security ?
This is the protection of data such as database from accidental, unauthorised or malicious access

Data Protection Act
Data protection Act controls and monitors the way personal and customer information is been used by organisations.
The Data Protection Act 1998 (DPA 1998) is an Act of the UK parliament that defines the ways in which peoples information is been handed. 8 Data Protection Act Principles
• Data must be Processed lawfully and fairly
• Must not be retained longer than necessary.
• Must be current and accurate.
• Must be adequate and not excessive.
• Must be well protected against unauthorized or accidental loss.
• Must be processed in accordance to freedom and right of data subject.
• Must not be transferred to a country outside European Economic Area, without adequate protection.
• Must be obtained and obtained for lawful purpose only.

Information that should be protected • Full Name
• Date of Birth
• Place of Birth
• Address
• Mother’s Maiden Name
• Social security Number
• Credit Card number
• Bank Account Number
• Passwords
• Medical Records
• Employment History

How the malicious breach occurred
• Advanced malware
• Distributed Denial of service.
• Targeted attacks.
• Virus.
• SQL injection.
• Hijacked or stolen device
• Targeted Attacks
• Social Engineering

Causes of Data security breach
• Weak security systems
• System or application design error
• Businesses or staff lost sensitive data entrusted to them
• Employee or contractor compromised sensitive data using insecure
Internet applications.
• Lost sensitive data contained in a backup media.
• Failed to thoroughly wipe a device containing sensitive data

Security measures
• Forensic security tools
• File fragmentation, replication and storage
• Network/traffic intelligence
• Access control with Badging and Biometric Identification.
• Strong password.
• Security cameras for video monitoring and analytics.
• Hard disk

You May Also Find These Documents Helpful

  • Satisfactory Essays

    • Your summary should be written in a concise and clear manner that summarizes your policy for readers.…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    In order for ZXY Inc. to make sure that their entire organization is secure, some proposals have been put into place to protect the company. The company needs to make sure that the network, their employee’s, company devices, and communications are secure from the outside world. The proposals that have been put into place cover such areas as: access control methods, authentication, user’s accounts and passwords, cryptography, remote access, network attack mitigation, malware and device vulnerabilities, and web and e-mail attack mitigation. These proposals when combined together help form an entire security policy for ZXY Inc. to use in order to protect all company assets.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Satisfactory Essays

    Data Security

    • 335 Words
    • 2 Pages

    7. Each of the following is a variation available in network access control (NAC) implementations except __________.…

    • 335 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Securing sensitive items

    • 542 Words
    • 3 Pages

    In the military most people think when they hear the term "sensitive items" they will think of thing such as weapons, security codes, classified information, ect. However most things in the military are considered to some degree a "sensitive item". . Which if they ended up falling into the hands of the enemy could cause minor or major damage to our nations national security and possibly endanger the lives of those both at home and deployed across the world.…

    • 542 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    A ____ is a shared electrical or optical channel that connects two or more devices.…

    • 584 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    You will learn how to match common risks or threats within the seven domains of a typical IT…

    • 1423 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    The midterm exam consists of 5 questions which relate to material from the first 4 weeks of the course including assigned reading from the text, lectures, tutorials, and threaded discussions. The exam questions are randomly selected for each student from question pools so that the questions you get will be different from those another student gets. Specifically, the questions address Terminal Course Objectives A, B, and C.…

    • 360 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Which application is used for Step 2 in the hacking process to perform a vulnerability assessment scan? Nessus vulnerability assessment scanning software.…

    • 381 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    A business stands to face the same type of security and privacy issues. Proprietary information that is important to a business’ success can be stolen, sold or sabotaged by employees within the company. Some of the information taken can be trade secrets, financial documentation and employee personnel files.…

    • 962 Words
    • 4 Pages
    Better Essays
  • Better Essays

    Security and Privacy

    • 1863 Words
    • 6 Pages

    The cleaning staff was scene reading documents that were thrown in the trash while performing their cleaning duties. Technically the cleaning staff was not violating any laws because the printouts were tossed into the trash which makes them public information. With that being said the cleaning staff should be…

    • 1863 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Listening is the most important way in which to establish a respectful and professional relationship with a child or young person. By people listening to what a child has to say, without interruption, shows the child that they are interested in what the child has to say. By not interrupting the child, it shows that their views and opinions are not only respected, but are also as important as the views and opinions of the person they are talking to. You should maintain eye contact; concentrate on what the child is saying and physically lower yourself to the child’s level to make the child feel more comfortable and shows the child they are respected and on the same level as the adult. You should also take an active interest in what the child has to say, this will show the child that you respect them and make them feel like you want to hear what they have to say.…

    • 885 Words
    • 4 Pages
    Good Essays
  • Better Essays

    When people more depend on the information systems, people have been experienced some security problems with information systems. Because some other systems are being developed to breach the information from those systems and people use them in…

    • 1700 Words
    • 6 Pages
    Better Essays
  • Better Essays

    A breach is when there is unauthorized access to someone’s personal information for means to collect, use, or to disclose. These breaches happen mostly when the information is stolen, lost, or disclosed by accident (e.g., a computer containing personal information is stolen or the information emailed to the wrong people by accident.). Breaches may also be a result of errors in an organization’s procedure. Such information that is stolen can belong to a customer, patient, client, or employee. Once a breach has been identified, the organization must take immediate action to address the incident and reduce any additional risk that results from the event. This is when redundancy becomes very important in enterprise architecture because organizational information systems provide a failover mode that helps to ensure that failed components trigger the appropriate backup components with similar capability.…

    • 1179 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Database Security

    • 28580 Words
    • 115 Pages

    - 1 - Database Security *) GÜNTHER PERNUL Institut für Angewandte Informatik und Informationssysteme Abteilung für Information Engineering Universität Wien Vienna, Austria 1. Introduction 1.1 The Relational Data Model Revisited 1.2…

    • 28580 Words
    • 115 Pages
    Powerful Essays
  • Good Essays

    These are inserted for the purposes of protecting computer software. A few forms of software access restrictions are as follows:…

    • 1277 Words
    • 6 Pages
    Good Essays