Different Types of Data Security

 

What are Different Types of Data Security

Data security plays very crucial role in information and cyber security. Various types of data security measures and techniques are used to protect information, systems, or sensitive data.

Following is the list of types of data security:

1.     1.    Physical Security:

The physical security involves the security of physical infrastructure of the systems where data is stored. In physical security the various measures include security guards, surveillances cameras, locked server rooms, biometric access control.

2.     2.    Network Security:

Network security ensures or safeguards the data or information during the data transmission over the network. These securities include,

·        Firewalls:

The firewalls ensure to filter in the incoming and outgoing traffic over the network.

What are Firewalls:

Firewalls are the network security devices or software that are the barrier between trusted inter network and untrusted external network.   The firewalls monitor incoming and outgoing network traffic based on security rules. Firewalls plays very important role in protecting networks and devices from unauthorized access, unauthorized use, cyber-attacks and malicious activity.

·        Intrusion Detection Systems(IDS) and Intrusion Prevention System(IPS):  

These systems are used to detect and prevent unauthorized access in the system and also prevent unauthorized use of system.

·        Virtual Private Networks(VPN):

The virtual private networks help to secure the data transmission over the different types of networks, especially public networks. The VPN is mostly used to provide the privacy, security when accessing the internet or connecting to the private networks. Encryption protocol helps to secure the data transmission between your device and VPN server.

·        Encryption:

The encryption method or technique is used to encode the data during transmission over the network.

The encryption is a security technique which is used to protect our confidential or sensitive data over the network by converting it into unreadable format and which can only be readable with the help of decryption key.

In the digital communications and storage systems the encryption plays crucial role in ensuring the data confidentiality, data integrity and data security.

 

What is Encryption:

Encryption is a method to convert the data into code to prevent that data from unauthorized access. It is a process to convert readable data (plain text) into secrete code (cipher text) to secure it from unauthorized access. The purpose of encryption is to provide security to confidential and sensitive data by making it unreadable form to avoid any unauthorized alteration and this data only will be converted by the decryption key by the authorized user. 

The encryption algorithm or cipher (it is a specific algorithm) is used to convert plain text (unencrypted text) into cipher text (encrypted data) and vice versa. The cipher technique in encryption ensures in data security data confidentiality.

1.     

1.      3.    Access Control:

The access control means who can access your data or system and who is restricted for access. The access control ensure that only authorized users can access the data or information. The access control includes,

·        Authentication:

Authentication ensure the identity of the users. It verifies the authentic users to enter in the system.

·        Authorization:

The authorization means assigning the specific permission based on the roles or needs in the system. E.g. higher authority has access of whole system, admin of system has access of full system but the other departments have only view access, as well as only limited access. They cannot access whole system or data.

·        Multi Factor Authentication(MFA):

This method helps to to add extra security layers beyond the passwords. Temporary access control such as OTP’s. Two factor authentication such as design pattern, biometric such as finger prints, facial recognition, retina scan etc.

टिप्पणी पोस्ट करा

0 टिप्पण्या