2. What is data protection
Data protection is the process of
safeguarding important data from
corruption, compromise or loss and
providing the capability to restore
the data to a functional state
3.
4. Data protectionis the process ofsafeguarding
important data from corruption,compromise or
loss and providingthcapability to restorethedata
to a functional state
5. Methods of Data Protection
Encryption of data
Conversion of plain Text into cipher text is
called encryptions
Decryption means to translate convert
cipher text into plain text.
Even if hacker obtain the encrypted data, he
cannot understand the information.
6. SSL Secure Sockets Layer
1. Secure sockets layer is the standard security technology for establishing an
encrypted link between a web server and a browser.
2. This link ensures that all data passed between the web server and browsers
remain private and integral.
7. 3. Firewall
Packet Filter:
Looks at each packet entering or leaving the network and
accepts or rejects it based on user-defined rules
Proxy Server:
Intercepts all messages entering and leaving the network.
Application -Layer Firewalls:
Recognize when certain applications and protocol such as
HTTP, FTP and DNS -- are being misused.
A firewall is a network security device that monitors incoming and outgoing
network traffic and decides whether to allow or block specific traffic based on
a defined set of security rules.
8. Antivirus & antispyware
Anti spyware software is a type of
program designed to prevent and detect
unwanted spyware program installations
Anti-virus software is a software utility
detects prevents and remove viruses
worms and other malware from the
computer
9. Other necessary steps
1. Other necessary steps
2. Do a background checks
3. At least two reference for new employee
4. Use strong password and change the password frequently
5. Stopping usage of cracked and hacked applications
10.
11. what is privacy?
Privacy is the aspect of information
technology which deals with the ability of
an organization or individual to determine
what data in a computer system can be
shared with third parties.
12. Privacy Laws
Regulations that protects a
person's/organization’s data private and
governs collection, storage, and release
of his or her financial, medical, and other
personal information to third party.
13. Classification of privacy laws
• General privacy laws that have an overall bearing
on the personal information of individuals
• Specific privacy laws that are designed to regulate specific types
of information. E.g. Communication privacy laws, Financial
privacy laws, Health privacy laws, Information privacy laws
,Online privacy laws ,Privacy in one’s home.
14. Why Privacy Matters
1. To limit on Power- of company who hold data.
2. To respect for Individuals
3. To maintain Appropriate Social Boundaries
4. To maintain Freedom of Thought and Speech of person
whom data belong
5. To maintain Freedom of Social and Political Activities of
person whom data belong
15. Privacy threats
1. Web Tracking
2. Data collection
3. Lack of security
4. Connected everything
5. Public Wi-Fi
6. Government spying
7. Social networking
16. The (Indian) Information Technology
Act, 2000 section 43A
Under section 72A of the (Indian) Information
Technology Act, 2000, disclosure of information,
knowingly and intentionally, without the consent of the
person concerned and in breach of the lawful contract is
punishable with imprisonment for a term extending to
three years and fine extending to Rs 5,00,000