It 22
It 22
Redkar
will be
giving
advice to
keep
personal
informatio
n safe
Some ways to safe our data
●
Use strong passwords: Create passwords that
are at least 12 characters long and use a mix
of upper and lower case letters, numbers, and
symbols. Avoid using personal information like
your birthday or a pet's name. You can use a
password manager to keep track of your
passwords.
●
Keep your devices updated: Install the latest
software and app updates.
●
Use two-factor authentication: Set up two-
factor authentication (2SV) for your accounts.
●
Back up your data: Back up your personal data
●
2
Confidentiality: Ensuring that only authorized individuals or systems can access specific data. This can be achieved using encryption,
access control policies, and secure authentication methods.
Integrity: Ensuring that data remains accurate and unaltered, whether it is stored or transmitted. Techniques like hashing and checksums
can detect and prevent unauthorized changes.
Availability: Ensuring that data is accessible when needed by authorized users. This includes protection against denial of service (DoS)
attacks and ensuring proper backup systems are in place.
Authentication: Verifying the identity of users or systems before allowing them access to data. This can involve passwords, biometrics,
multi-factor authentication, and digital certificates.
Authorization: Defining what actions authenticated users are permitted to take with data. Role-based access control (RBAC) is a common
method for managing authorization.
Encryption: Encoding data so that only authorized parties can read it, even if they intercept the data. Encryption is used for data at rest
(stored data) and data in transit (data being transmitted).
Data Masking and Tokenization: These methods hide sensitive data elements in non-sensitive formats, reducing the risk of exposure in
case of a breach.
Backup and Recovery: Regularly backing up data ensures that in the event of a cyberattack, hardware failure, or natural disaster, data can
be restored to a secure state.
Compliance: Ensuring data security practices align with legal and regulatory requirements (e.g., GDPR, HIPAA, CCPA) to protect user
privacy and sensitive information.
Incident Response: Developing a plan to detect, respond to, and recover from security breaches or data compromises.
Effective data security requires a combination of tools, techniques, and policies tailored to an organization's specific needs and the types
of data it handles.
3
●
THANK YOU