What are Different Types of Data Security
Data security plays very crucial
role in information and cyber security. Various types of data security measures
and techniques are used to protect information, systems, or sensitive data.
Following is the list of types of data security:
1. 1. Physical Security:
The physical security
involves the security of physical infrastructure of the systems where data is
stored. In physical security the various measures include security guards, surveillances
cameras, locked server rooms, biometric access control.
2. 2. Network Security:
Network security
ensures or safeguards the data or information during the data transmission over
the network. These securities include,
·
Firewalls:
The firewalls ensure to filter in the incoming and outgoing traffic over
the network.
What are Firewalls:
Firewalls are the network security devices or software that are the
barrier between trusted inter network and untrusted external network. The firewalls monitor incoming and outgoing
network traffic based on security rules. Firewalls plays very important role in
protecting networks and devices from unauthorized access, unauthorized use, cyber-attacks
and malicious activity.
·
Intrusion
Detection Systems(IDS) and Intrusion Prevention System(IPS):
These systems are used to detect and prevent unauthorized access in the
system and also prevent unauthorized use of system.
·
Virtual Private
Networks(VPN):
The virtual private networks help to secure the data transmission over
the different types of networks, especially public networks. The VPN is mostly
used to provide the privacy, security when accessing the internet or connecting
to the private networks. Encryption protocol helps to secure the data transmission
between your device and VPN server.
·
Encryption:
The encryption method or technique is used to encode the data during transmission
over the network.
The encryption is a security technique which is used to protect our
confidential or sensitive data over the network by converting it into
unreadable format and which can only be readable with the help of decryption key.
In the digital communications and storage systems the encryption plays
crucial role in ensuring the data confidentiality, data integrity and data
security.
What is Encryption:
Encryption is a method to convert the data into code to prevent that data from unauthorized access. It is a process to convert readable data (plain text) into secrete code (cipher text) to secure it from unauthorized access. The purpose of encryption is to provide security to confidential and sensitive data by making it unreadable form to avoid any unauthorized alteration and this data only will be converted by the decryption key by the authorized user.
The encryption algorithm or cipher (it is a specific algorithm) is used to convert plain text (unencrypted text) into cipher text (encrypted data) and vice versa. The cipher technique in encryption ensures in data security data confidentiality.
1.
1. 3. Access Control:
The access control
means who can access your data or system and who is restricted for access. The
access control ensure that only authorized users can access the data or
information. The access control includes,
·
Authentication:
Authentication ensure the identity of the users. It verifies the authentic
users to enter in the system.
·
Authorization:
The authorization means assigning the specific permission based on the
roles or needs in the system. E.g. higher authority has access of whole system,
admin of system has access of full system but the other departments have only
view access, as well as only limited access. They cannot access whole system or
data.
·
Multi Factor Authentication(MFA):
This method helps to to add extra security layers beyond the passwords.
Temporary access control such as OTP’s. Two factor authentication such as
design pattern, biometric such as finger prints, facial recognition, retina
scan etc.
0 टिप्पण्या
कृपया तुमच्या प्रियजनांना लेख शेअर करा आणि तुमचा अभिप्राय जरूर नोंदवा. 🙏 🙏