SlideShare a Scribd company logo
1 of 9
3 Characteristics of Well
Protected Data
In general, software products are
meant for processing, storing and
exchange of data. Different
programs process different kinds
of data for different purposes.
At present security of user data have
become one of the main requirements
to an application. Security standards are
very high for e-commerce, banking and
other programs dealing with sensitive
business and personal data.
1. Every user has access and is able to edit
only the data that he or she is entitled to
utilize.
2. All the sensitive data are stored in an
encrypted form.
One Can Say That
Data are Properly Protected If:
3. All the sensitive data are transferred
between the server and client machine, the
system modules, other software products, etc.
in an encrypted form, via protected channels.
One Can Say That
Data are Properly Protected If:
Data protection is one of the main
points during security testing of
a software product. Test engineers
have to find out whether the
mentioned conditions are met.
Besides, it is necessary to check whether
the data are not corrupted or lost during
coding, decoding and transitions. One
should make sure that sensitive
information does not appear in a readable
form anywhere, for example, in the
browser address line.
Manual and automated testing is
applied for checking data protection. This
part of software testing must be carried
out thoroughly; otherwise the application
users and owners may face serious
problems.
Thank You

More Related Content

What's hot

Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information SystemDaryl Conson
 
Fighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud CybersecurityFighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud CybersecurityDavid Zaizar
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityBharath Rao
 
BTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal ConstraintsBTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal Constraintsmrcox
 
HAVEN Password Policy
HAVEN Password PolicyHAVEN Password Policy
HAVEN Password PolicyAce McGinnis
 
Data protection and security
Data protection and securityData protection and security
Data protection and securitysamina khan
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technologyparamalways
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariArber Hoxhallari
 
Compliance to privacy act and mandatory data breach reporting for schools
Compliance to privacy act and mandatory data breach reporting for schoolsCompliance to privacy act and mandatory data breach reporting for schools
Compliance to privacy act and mandatory data breach reporting for schoolse-Safe Systems
 
Industrie 4.0-security-4.0
Industrie 4.0-security-4.0Industrie 4.0-security-4.0
Industrie 4.0-security-4.0Markus Huber
 
Database security and privacy
Database security and privacyDatabase security and privacy
Database security and privacyMd. Ahasan Hasib
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Securitynexxtep
 

What's hot (17)

Security and Control Issues in Information System
Security and Control Issues in Information SystemSecurity and Control Issues in Information System
Security and Control Issues in Information System
 
Threats
ThreatsThreats
Threats
 
Policy and procedure
Policy and procedurePolicy and procedure
Policy and procedure
 
Fighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud CybersecurityFighting The Top 7 Threats to Cloud Cybersecurity
Fighting The Top 7 Threats to Cloud Cybersecurity
 
Information security
Information securityInformation security
Information security
 
The CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information SecurityThe CIA Triad - Assurance on Information Security
The CIA Triad - Assurance on Information Security
 
BTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal ConstraintsBTEC National in ICT: Unit 3 - Legal Constraints
BTEC National in ICT: Unit 3 - Legal Constraints
 
HAVEN Password Policy
HAVEN Password PolicyHAVEN Password Policy
HAVEN Password Policy
 
Data protection and security
Data protection and securityData protection and security
Data protection and security
 
Security And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation TechnologySecurity And Ethical Challenges Of Infornation Technology
Security And Ethical Challenges Of Infornation Technology
 
Security and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber HoxhallariSecurity and ethical issues - Arber Hoxhallari
Security and ethical issues - Arber Hoxhallari
 
Compliance to privacy act and mandatory data breach reporting for schools
Compliance to privacy act and mandatory data breach reporting for schoolsCompliance to privacy act and mandatory data breach reporting for schools
Compliance to privacy act and mandatory data breach reporting for schools
 
Industrie 4.0-security-4.0
Industrie 4.0-security-4.0Industrie 4.0-security-4.0
Industrie 4.0-security-4.0
 
Database security and privacy
Database security and privacyDatabase security and privacy
Database security and privacy
 
Ingles
InglesIngles
Ingles
 
Infosec
InfosecInfosec
Infosec
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 

Viewers also liked

Fauna e flora
Fauna e floraFauna e flora
Fauna e floraebelly26
 
Memria Sonho E Memria Trabalho
Memria Sonho E Memria TrabalhoMemria Sonho E Memria Trabalho
Memria Sonho E Memria TrabalhoDAIANE
 
Tecnologia Na Minha Escola
Tecnologia Na Minha EscolaTecnologia Na Minha Escola
Tecnologia Na Minha Escolacelieleodora
 
Vale Vêneto
Vale VênetoVale Vêneto
Vale VênetoDAIANE
 
Ocultación de la relación laboral: terminología usada
Ocultación de la relación laboral: terminología usadaOcultación de la relación laboral: terminología usada
Ocultación de la relación laboral: terminología usadaMiguel Ramírez
 
Fotos Lista (2)
Fotos Lista (2)Fotos Lista (2)
Fotos Lista (2)chas2009
 
Fronteira Seca Renato E Felipe
Fronteira Seca    Renato E FelipeFronteira Seca    Renato E Felipe
Fronteira Seca Renato E FelipeDAIANE
 
Logística Artigos e Conceitos
Logística Artigos e ConceitosLogística Artigos e Conceitos
Logística Artigos e Conceitosguest3bbc023
 
Todo sobre la incapacidad laboral en Colombia
Todo sobre la incapacidad laboral en ColombiaTodo sobre la incapacidad laboral en Colombia
Todo sobre la incapacidad laboral en ColombiaMiguel Ramírez
 
Derechos de los usuarios bancarios en Colombia
Derechos de los usuarios bancarios en ColombiaDerechos de los usuarios bancarios en Colombia
Derechos de los usuarios bancarios en ColombiaMiguel Ramírez
 
Tutorial acceso a página de sites
Tutorial acceso a página de sitesTutorial acceso a página de sites
Tutorial acceso a página de sitesdroiartzun
 
Cómo resguardarte del robo de identidad en internet
Cómo resguardarte del robo de identidad en internetCómo resguardarte del robo de identidad en internet
Cómo resguardarte del robo de identidad en internetMiguel Ramírez
 
Cidade Administrativa
Cidade AdministrativaCidade Administrativa
Cidade AdministrativaViva Minas
 

Viewers also liked (20)

Fauna e flora
Fauna e floraFauna e flora
Fauna e flora
 
Memria Sonho E Memria Trabalho
Memria Sonho E Memria TrabalhoMemria Sonho E Memria Trabalho
Memria Sonho E Memria Trabalho
 
Tecnologia Na Minha Escola
Tecnologia Na Minha EscolaTecnologia Na Minha Escola
Tecnologia Na Minha Escola
 
Vale Vêneto
Vale VênetoVale Vêneto
Vale Vêneto
 
Portugal Brand
Portugal BrandPortugal Brand
Portugal Brand
 
NG7-DR1
NG7-DR1NG7-DR1
NG7-DR1
 
Ocultación de la relación laboral: terminología usada
Ocultación de la relación laboral: terminología usadaOcultación de la relación laboral: terminología usada
Ocultación de la relación laboral: terminología usada
 
Fotos Lista (2)
Fotos Lista (2)Fotos Lista (2)
Fotos Lista (2)
 
Fronteira Seca Renato E Felipe
Fronteira Seca    Renato E FelipeFronteira Seca    Renato E Felipe
Fronteira Seca Renato E Felipe
 
Ensayo Paulina M
Ensayo Paulina MEnsayo Paulina M
Ensayo Paulina M
 
Logística Artigos e Conceitos
Logística Artigos e ConceitosLogística Artigos e Conceitos
Logística Artigos e Conceitos
 
Todo sobre la incapacidad laboral en Colombia
Todo sobre la incapacidad laboral en ColombiaTodo sobre la incapacidad laboral en Colombia
Todo sobre la incapacidad laboral en Colombia
 
Derechos de los usuarios bancarios en Colombia
Derechos de los usuarios bancarios en ColombiaDerechos de los usuarios bancarios en Colombia
Derechos de los usuarios bancarios en Colombia
 
Tutorial acceso a página de sites
Tutorial acceso a página de sitesTutorial acceso a página de sites
Tutorial acceso a página de sites
 
Cómo resguardarte del robo de identidad en internet
Cómo resguardarte del robo de identidad en internetCómo resguardarte del robo de identidad en internet
Cómo resguardarte del robo de identidad en internet
 
Factoring en colombia
Factoring en colombiaFactoring en colombia
Factoring en colombia
 
Got pdp
Got pdpGot pdp
Got pdp
 
Spar Ky
Spar KySpar Ky
Spar Ky
 
Cidade Administrativa
Cidade AdministrativaCidade Administrativa
Cidade Administrativa
 
Lispector
LispectorLispector
Lispector
 

Similar to 3 Characteristics Well Protected Data

CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) ghayour abbas
 
Security Considerations in Mobile App Development_ Protecting User Data.pdf
Security Considerations in Mobile App Development_ Protecting User Data.pdfSecurity Considerations in Mobile App Development_ Protecting User Data.pdf
Security Considerations in Mobile App Development_ Protecting User Data.pdfBravoSebastian
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | SecloreSeclore
 
Document Management System SharePoint
Document Management System SharePoint Document Management System SharePoint
Document Management System SharePoint i2econsulting
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptxSofiyaKhan49
 
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxLESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxmahaliacaraan
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsLindaWatson19
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceAdrian Dumitrescu
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the EnterpriseWill Adams
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's GuideReece Gaumont
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data ProtectionCreatorsCircle
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare ApplicationCitiusTech
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer SystemIRJET Journal
 
Take the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionTake the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionVTECH SOLUTION
 
Securing application data | Seclore
Securing application data | SecloreSecuring application data | Seclore
Securing application data | SecloreSeclore
 

Similar to 3 Characteristics Well Protected Data (20)

Wp security-data-safe
Wp security-data-safeWp security-data-safe
Wp security-data-safe
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
 
Security Considerations in Mobile App Development_ Protecting User Data.pdf
Security Considerations in Mobile App Development_ Protecting User Data.pdfSecurity Considerations in Mobile App Development_ Protecting User Data.pdf
Security Considerations in Mobile App Development_ Protecting User Data.pdf
 
Application Data Security | Seclore
Application Data Security | SecloreApplication Data Security | Seclore
Application Data Security | Seclore
 
Document Management System SharePoint
Document Management System SharePoint Document Management System SharePoint
Document Management System SharePoint
 
Cloud_security.pptx
Cloud_security.pptxCloud_security.pptx
Cloud_security.pptx
 
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptxLESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
LESSON_3_Maintain_Computer_Equipment_and_Systems.pptx
 
Extending Information Security to Non-Production Environments
Extending Information Security to Non-Production EnvironmentsExtending Information Security to Non-Production Environments
Extending Information Security to Non-Production Environments
 
Dstca
DstcaDstca
Dstca
 
GDPR Part 2: Quest Relevance
GDPR Part 2: Quest RelevanceGDPR Part 2: Quest Relevance
GDPR Part 2: Quest Relevance
 
Mobile Security for the Enterprise
Mobile Security for the EnterpriseMobile Security for the Enterprise
Mobile Security for the Enterprise
 
Paper2
Paper2Paper2
Paper2
 
Soonr IT Buyer's Guide
Soonr IT Buyer's GuideSoonr IT Buyer's Guide
Soonr IT Buyer's Guide
 
Personal Data Protection
Personal Data ProtectionPersonal Data Protection
Personal Data Protection
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare Application
 
IRJET- Security from Threats of Computer System
IRJET-  	  Security from Threats of Computer SystemIRJET-  	  Security from Threats of Computer System
IRJET- Security from Threats of Computer System
 
1784 1788
1784 17881784 1788
1784 1788
 
1784 1788
1784 17881784 1788
1784 1788
 
Take the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionTake the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security Protection
 
Securing application data | Seclore
Securing application data | SecloreSecuring application data | Seclore
Securing application data | Seclore
 

More from QATestLab

Performance and penetration_testing_with_a_partner_how_to_start!
Performance and penetration_testing_with_a_partner_how_to_start!Performance and penetration_testing_with_a_partner_how_to_start!
Performance and penetration_testing_with_a_partner_how_to_start!QATestLab
 
Why to pay for independent testing, when i have an in house development team
Why to pay for independent testing, when i have an in house development teamWhy to pay for independent testing, when i have an in house development team
Why to pay for independent testing, when i have an in house development teamQATestLab
 
How many testing_types_does_a_project_need
How many testing_types_does_a_project_needHow many testing_types_does_a_project_need
How many testing_types_does_a_project_needQATestLab
 
Dedicated qa team will it really screw up testing
Dedicated qa team will it really screw up testingDedicated qa team will it really screw up testing
Dedicated qa team will it really screw up testingQATestLab
 
Independent testing. Remote teams risks
Independent testing. Remote teams risksIndependent testing. Remote teams risks
Independent testing. Remote teams risksQATestLab
 
What is incremental development model?
What is incremental development model?What is incremental development model?
What is incremental development model?QATestLab
 
Peculiarities of RAD Model Development
Peculiarities of RAD Model DevelopmentPeculiarities of RAD Model Development
Peculiarities of RAD Model DevelopmentQATestLab
 
Regression vs Retesting
Regression vs RetestingRegression vs Retesting
Regression vs RetestingQATestLab
 
V-Model Development: Fundamentals
V-Model Development: FundamentalsV-Model Development: Fundamentals
V-Model Development: FundamentalsQATestLab
 
Pluses and minuses of retesting
Pluses and minuses of retestingPluses and minuses of retesting
Pluses and minuses of retestingQATestLab
 
The Notion of A/A Testing
The Notion of A/A TestingThe Notion of A/A Testing
The Notion of A/A TestingQATestLab
 
What Is Cucumber?
What Is Cucumber?What Is Cucumber?
What Is Cucumber?QATestLab
 
How to Perform A/B Testing?
How to Perform A/B Testing?How to Perform A/B Testing?
How to Perform A/B Testing?QATestLab
 
What Is SQL?
What Is SQL?What Is SQL?
What Is SQL?QATestLab
 
What Is Jira?
What Is Jira?What Is Jira?
What Is Jira?QATestLab
 
What Is JMeter?
What Is JMeter?What Is JMeter?
What Is JMeter?QATestLab
 
QTP Strong Points
QTP Strong PointsQTP Strong Points
QTP Strong PointsQATestLab
 
Selenium vs QTP
Selenium vs QTPSelenium vs QTP
Selenium vs QTPQATestLab
 
Briefly About Selenium IDE
Briefly About Selenium IDEBriefly About Selenium IDE
Briefly About Selenium IDEQATestLab
 
Why Shouldn’t Weekly Status Reports Be Ignored?
Why Shouldn’t Weekly Status Reports Be Ignored?Why Shouldn’t Weekly Status Reports Be Ignored?
Why Shouldn’t Weekly Status Reports Be Ignored?QATestLab
 

More from QATestLab (20)

Performance and penetration_testing_with_a_partner_how_to_start!
Performance and penetration_testing_with_a_partner_how_to_start!Performance and penetration_testing_with_a_partner_how_to_start!
Performance and penetration_testing_with_a_partner_how_to_start!
 
Why to pay for independent testing, when i have an in house development team
Why to pay for independent testing, when i have an in house development teamWhy to pay for independent testing, when i have an in house development team
Why to pay for independent testing, when i have an in house development team
 
How many testing_types_does_a_project_need
How many testing_types_does_a_project_needHow many testing_types_does_a_project_need
How many testing_types_does_a_project_need
 
Dedicated qa team will it really screw up testing
Dedicated qa team will it really screw up testingDedicated qa team will it really screw up testing
Dedicated qa team will it really screw up testing
 
Independent testing. Remote teams risks
Independent testing. Remote teams risksIndependent testing. Remote teams risks
Independent testing. Remote teams risks
 
What is incremental development model?
What is incremental development model?What is incremental development model?
What is incremental development model?
 
Peculiarities of RAD Model Development
Peculiarities of RAD Model DevelopmentPeculiarities of RAD Model Development
Peculiarities of RAD Model Development
 
Regression vs Retesting
Regression vs RetestingRegression vs Retesting
Regression vs Retesting
 
V-Model Development: Fundamentals
V-Model Development: FundamentalsV-Model Development: Fundamentals
V-Model Development: Fundamentals
 
Pluses and minuses of retesting
Pluses and minuses of retestingPluses and minuses of retesting
Pluses and minuses of retesting
 
The Notion of A/A Testing
The Notion of A/A TestingThe Notion of A/A Testing
The Notion of A/A Testing
 
What Is Cucumber?
What Is Cucumber?What Is Cucumber?
What Is Cucumber?
 
How to Perform A/B Testing?
How to Perform A/B Testing?How to Perform A/B Testing?
How to Perform A/B Testing?
 
What Is SQL?
What Is SQL?What Is SQL?
What Is SQL?
 
What Is Jira?
What Is Jira?What Is Jira?
What Is Jira?
 
What Is JMeter?
What Is JMeter?What Is JMeter?
What Is JMeter?
 
QTP Strong Points
QTP Strong PointsQTP Strong Points
QTP Strong Points
 
Selenium vs QTP
Selenium vs QTPSelenium vs QTP
Selenium vs QTP
 
Briefly About Selenium IDE
Briefly About Selenium IDEBriefly About Selenium IDE
Briefly About Selenium IDE
 
Why Shouldn’t Weekly Status Reports Be Ignored?
Why Shouldn’t Weekly Status Reports Be Ignored?Why Shouldn’t Weekly Status Reports Be Ignored?
Why Shouldn’t Weekly Status Reports Be Ignored?
 

Recently uploaded

Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?Watsoo Telematics
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningVitsRangannavar
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 

Recently uploaded (20)

Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?What are the features of Vehicle Tracking System?
What are the features of Vehicle Tracking System?
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
cybersecurity notes for mca students for learning
cybersecurity notes for mca students for learningcybersecurity notes for mca students for learning
cybersecurity notes for mca students for learning
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 

3 Characteristics Well Protected Data

  • 1. 3 Characteristics of Well Protected Data
  • 2. In general, software products are meant for processing, storing and exchange of data. Different programs process different kinds of data for different purposes.
  • 3. At present security of user data have become one of the main requirements to an application. Security standards are very high for e-commerce, banking and other programs dealing with sensitive business and personal data.
  • 4. 1. Every user has access and is able to edit only the data that he or she is entitled to utilize. 2. All the sensitive data are stored in an encrypted form. One Can Say That Data are Properly Protected If:
  • 5. 3. All the sensitive data are transferred between the server and client machine, the system modules, other software products, etc. in an encrypted form, via protected channels. One Can Say That Data are Properly Protected If:
  • 6. Data protection is one of the main points during security testing of a software product. Test engineers have to find out whether the mentioned conditions are met.
  • 7. Besides, it is necessary to check whether the data are not corrupted or lost during coding, decoding and transitions. One should make sure that sensitive information does not appear in a readable form anywhere, for example, in the browser address line.
  • 8. Manual and automated testing is applied for checking data protection. This part of software testing must be carried out thoroughly; otherwise the application users and owners may face serious problems.