Data Security Measures
Data Security Measures
Data security is certainly a hot topic these days. Controlling access to data helps ensure
privacy and is required according to federal agency policies and regulations. Data security is
a process of making sure data are available only to those who need to use it for a legitimate
purpose. We have found that data security is not very different from other forms of security.
The same concepts used to design castles apply to the construction of servers that offer
access to a corporate database. The details are different, and the technical pieces are quite
different, but the same approaches, rules and lessons apply. Below are some important
maxims to keep in mind. Most of them have stood the test of time for thousands of years:
i. There is no such thing as absolute security: We can raise the attacker’s cost of
breaching our data security to a very high level, but absolute guarantees are
not possible.
ii. Data security is always a question of economics: What is the value of what you
are protecting? How much time, effort, and money are your opponent’s willing to
spend to get through your defenses?
iii. An attacker doesn’t go through security, but around it: Their goal is to find
and exploit the weakest link.
iv. Don’t underestimate the value of your asset: Often common everyday data
is underestimated. Mundane data can be very important.
Definition of terms
Data security: This is the process of making sure data is available only to those who need it for
legitimate purpose.
Data: This is the information that has been translated into a form that is efficient for movement
or processing.
Data privacy /Information privacy: It is the aspect of information technology that deals with
the ability of an organization or individual to determine what data in a computer system can
be shared with third parties.
Security threats: This is the process of an illegal entity gaining access to a company’s data or
information.
Control measures: This is any measure taken to eliminate or reduce the risk of security threats.
Cyber criminals: These are illegal users who use many different methods to lure you into
parting with your confidential personal or business information.
2.1 Data Security and Privacy Are Classified in Accordance with the
Prevailing Technology
As discussed earlier, data security is the process of making sure data is available only to those
who need to use it for legitimate use. Data security privacy on the other hand is the aspect of
information technology that deals with the ability of an organization or individual to
determine what data in a computer system can be shared with third parties. As more of our
daily lives go online and the data we share is used in new and innovative ways, privacy and
security have become important trust and reputation issues. The growing volume and
sensitivity of information being shared, stored and used is driving demand for greater
transparency about how such information is being protected (security) and managed
(privacy). As a result, data security and privacy have moved from the backroom to the
boardroom. Data breaches and privacy missteps now regularly make headlines and are a
focal point for discussions and legislation worldwide. Failure to communicate on these
important issues can damage business by eroding trust, tarnishing brand and reputation as
well as undermining competitiveness.
Data security ensures that the data is accurate and reliable, and it is available when those with
authorized access need it. A data security plan includes facets such as collecting only the
required information, keeping it safe, and destroying any information that is no longer
needed.
These steps will help any business meet the legal obligations of possessing sensitive data.
Companies need to enact data security policy for the sole purpose of ensuring data privacy,
or the privacy of their customers’ information. More so, companies must ensure data
Privacy because the information is an asset to the company. A data security policy is simply
the means to the desired end which is data privacy. However, no data security policy can
overcome the willing sale or soliciting of the consumer data that was entrusted to an
organization.