This document discusses the importance of data security. It introduces data as information stored in computers in binary format. Data can be transferred between devices via networks. The document emphasizes providing advanced email security, threat protection, data loss prevention, and endpoint protection to keep data secure. Data loss prevention ensures sensitive information is not sent outside a company's network without authorization. Key concepts of data security include availability, integrity, and confidentiality of data. Data should be accessible to authorized users, protected from unauthorized access and modification, and kept confidential to the intended recipients. Proper data security is crucial for businesses and individuals to protect sensitive information.
Aspirational Block Program Block Syaldey District - Almora
Data security
1. DATA SECURITY
It’s your Data – Are you sure it’s Safe?
Never Sacrifice Security | Keep your Data Safe
2. INTRODUCTION
Data is information processed and stored
in form of text, images audio clips and
software programs.
Data is secured in computer in binary
format which is bunch of 1 and 0.
Data stored in computer can be
transferred to other devices with the help
of networks.
3. We provide Advanced Email Security, Advanced
Threat Protection, Data Loss Prevention and
Endpoint Protection to keep your data secure.
Data Loss Prevention (DLP is a strategy to be sure
that end users are not able to send crucial and
ultrasensitive information outside the companies
network.
DLP follow business rules that states any
unauthorized user has access to the data whose
leakage can cause security threat for company.
5. TYPES OF DATA SECURITY AND IMPORTANCE
Network Layer Security
IPSec Protocol
Email Security
Data Security is crucial not only for business but
also for personal computers or laptops. Business
data, client information, personal files, detail of
bank account and other types of sensitive
information can be difficult to replace if it falls in the
hands of hacker.
6. KEY CONCEPTS OF DATA SECURITY
Availability
Integrity
Confidentiality
7. AVAILABILITY
Data should be accessible
anywhere and anytime.
Only the authorised users should
have access to data.
Tracking of data access is crucial
as to who has access to what type
of data.
8. INTEGRITY
Data should be encrypted and locked by
cipher.
Check the access control of data to various
users.
Need of verification system to analyse
whether report request are from users who
are authorised to have data access.
Checking that the data transfer is being
received by the authorised receiver.
9. CONFIDENTIALITY
Sensitive data should be accessible to
accurate people who have legitimate right to
use the data.
Protecting database whether external or
internal from unauthorized breaches.
there should be a report as to what persons
have access to what type of data and how
they have use it.
Legally crucial data must be kept under
very tight security so that company don't
has to face litigation process.
10. CONTACT US
Address : SCO 365-366, Sector 35(B)
Chandigarh-160022
Email id : fore@foresolutions.net
Visit www.foresolutions.net