SlideShare a Scribd company logo
Personal
Data
Security
JITEN
MUSCAT TECHNOLOGY
COMMUNITY
Data Security
 Data security is basically the process of keeping certain
information private
 It involves the use of various methods to make sure
that data is kept confidential and safe
 Data security ensures the integrity and the privacy of
data, as well as preventing the loss or corruption of
data.
Need of Data Security
 Many businesses hold very important and confidential
data
 Hence security of data is extremely important
 Data must be safeguarded all the time
Backups
 A master file stores the static data (does not change
frequently) found on the database
 The transaction file keeps track of all the changes
made to the database throughout the day
 At the end of the day, all the contents stored in the
transaction file are transferred to the master file in
order to update it
 This hierarchy is used for safety
Software Safeguards
 There are many software measures which can protect
data.
 The following explains some of the most common
approaches used now a days
IDS
 IDS stands for Intrusion Detection System
 IDS monitors the operation of the network to detect
illegal operations
 The system may be
1. server-based - detecting attacks on the operation of
the file-server
2. network based, watching the pattern of traffic across
the network
User ID
 User ID stands for User Identification
 This is a unique name or code used to identify a specific user
when gaining access (logging in).
 Methods of using a user ID;
1. Passwords - words or codes known only to the user. A
password is linked to a specific user ID.
2. Personal Identification Devices - a plastic card which identifies
the user and acts as an electronic key. Most cards have a
magnetic stripe to store information.
3. Personal Identification Numbers (PIN) - a number used as a
password, particularly with bank cards and credit cards.
Biometric
 Biometric is when the human’s features are used
 The individual’s biometric is measured by a special
scanner and used with the user ID
 Finding physical characteristics which cannot be copied
has been difficult now a days we use
1. fingerprints
2. retina scans
 Face and voice recognition have not be reliable
Encryption
 Encryption makes data in a computer system illegible
and makes data look meaningless
 Decryption is converting the illegible data back into its
original form
 An encryption key is a code used for the encryption
process
 A decryption key is needed before the data can be
changed back to its original form
Digital Signature
 A digital signature makes used of encrypted data
 A digital signature is encrypted data used to show that
the data being sent or read is genuine
 If the recipient of the data can correctly decrypt the
digital signature then the data should be correct
Digital Certificate
 This is an encrypted message which confirms that the
person is who they say they are
 A digital certificate includes a digital signature
 The certification authority, also known as a trusted
service provider or a trusted third party, is a business
that provides online certification facilities
Downloading
 Downloading software from the Internet is
much quicker and easier than buying it and
installing it. Many P2P (peer-to-peer)
applications exist (such as Torrents) which
facilitate the download of illegal software.
Software Counterfeiting
 Software Counterfeiting is when software is
copied illegally and re-sold. Some
counterfeited software can be very obvious
because only the CD is sold, but in more
“sophisticated‟ counterfeited software;
everything will be reproduced including the
Ethical Issues
 When you purchase software, you do not become the owner of the copyright., you
are purchasing the right to use the software under certain restrictions
 Using copied or counterfeit software also means:
1. Greater exposure to software viruses, corrupt disks, or otherwise defective
software
2. Inadequate or no documentation
3. No warranties
4. Lack of technical product support available to properly licensed users
5. Ineligibility for software upgrades offered to properly licensed users.
 Software piracy is not a victimless crime, piracy denies the software developer its
rightful profits and harms consumers and the industry as a whole
 All software developers, spend years creating software.
Legal Issues
 There are also serious legal issues when in comes to software privacy
 In the USA, software theft is a serious matter. If you are caught copying
software, you may be held liable under both civil and criminal law
 If the copyright owner brings a civil action against you, the owner can seek to
stop you from using its software immediately and can also request financial
payment . The copyright owner may choose between
1. Actual damages - which include the amount he/she has lost because of
your violation
2. Legal damages - which can be as much as $150,000 for each program
copied.
 In addition, the government can criminally prosecute you for copyright
infringement, you can be fined up to $250,000, or sentenced to jail for up to
five years, or both!
Software Protection
 Software developers try to protect their software by using many different
protection measures.
1. Serial Numbers: Certain software will ask the user to input a serial
number when installing the software. If the number is not inputted the
software will not install
2. Activation Keys: After the software is installed, the user is required to
enter some text (the activation key) so that the application will work.
This activation key is usually obtained from the seller of the
application. The user will send an e-mail with the product ID of the
application, and after the seller will confirm that the software is
original; he/she will send the activation key which will unlock the
software.
3. CD (or DVD) Copy Protection: Most companies will create a special
program when burning their application to the storage medium which
will prevent users from copying the software
4. Hardware Keys: In this case a hardware device (such as a USB pen) is
given with the software and for the software to be functional the USB
must be connected to the machine
Software Registration
 Most software is registered with the company that sells the
software. The user fills in some personal details such as name,
address and e-mail. This will allow the company to serve its
customers better
1. Updates: The software company can inform its registered
members with news about the product. This may include
news about new program releases, new updates or new
patches to the program
2. Bonus Features: Certain companies create bonus features
to the program
3. Discounts: Registered members usually benefit from
discounts on applications released by the same company.
4. Technical Support: Some companies offer technical
support

More Related Content

What's hot

Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Soo Chin Hock
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
Jason Murray
 
Desktop Security
Desktop SecurityDesktop Security
Desktop Security
HardikBhandari7
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
Strategic Insurance Software
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
mike parks
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
Nemwos
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
Akhil Nadh PC
 
Internet Security
Internet SecurityInternet Security
Internet Security
Peter R. Egli
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
mateenzero
 
Mobile security
Mobile securityMobile security
Mobile security
Naveen Kumar
 
Best Practices for Password Creation
Best Practices for Password CreationBest Practices for Password Creation
Best Practices for Password Creation
nFront Security
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
Geo Marian
 
Cyber security
Cyber securityCyber security
Cyber security
Dr. Kishor Nikam
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
Ramiro Cid
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
 
Computer security
Computer securityComputer security
Computer security
Univ of Salamanca
 
Mobile security
Mobile securityMobile security
Mobile security
CyberoamAcademy
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
Sharath Raj
 

What's hot (20)

Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdfCybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
Cybersecurity Awareness Month_2021_PartnerPresentation_Final.pdf
 
Cyber security awareness
Cyber security awarenessCyber security awareness
Cyber security awareness
 
Desktop Security
Desktop SecurityDesktop Security
Desktop Security
 
Cyber Security and Data Protection
Cyber Security and Data ProtectionCyber Security and Data Protection
Cyber Security and Data Protection
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
 
What is malware
What is malwareWhat is malware
What is malware
 
Mobile Device Security
Mobile Device SecurityMobile Device Security
Mobile Device Security
 
Cyber security awareness for students
 Cyber security awareness for students Cyber security awareness for students
Cyber security awareness for students
 
Internet Security
Internet SecurityInternet Security
Internet Security
 
Information security awareness - 101
Information security awareness - 101Information security awareness - 101
Information security awareness - 101
 
Computer security and
Computer security andComputer security and
Computer security and
 
Mobile security
Mobile securityMobile security
Mobile security
 
Best Practices for Password Creation
Best Practices for Password CreationBest Practices for Password Creation
Best Practices for Password Creation
 
Mobile security in Cyber Security
Mobile security in Cyber SecurityMobile security in Cyber Security
Mobile security in Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Computer security
Computer securityComputer security
Computer security
 
Mobile security
Mobile securityMobile security
Mobile security
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 

Similar to Personal Data Protection

3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer CrimeMISY
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And PrivacyMISY
 
Module 5 security
Module 5   securityModule 5   security
Module 5 securityIT
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
Wollo UNiversity
 
Take the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionTake the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security Protection
VTECH SOLUTION
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
Jan Wong
 
Siem requirement.pdfsd
Siem requirement.pdfsdSiem requirement.pdfsd
Siem requirement.pdfsd
Norman Funzani Manenzhe
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)Patrick Garrett
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1bora.gungoren
 
Data security
Data securityData security
Data security
AbdulBasit938
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
Caroline Johnson
 
Module 6.Security in Evolving Technology
Module 6.Security in Evolving TechnologyModule 6.Security in Evolving Technology
Module 6.Security in Evolving Technology
Sitamarhi Institute of Technology
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
mapletronics
 
Generic threats to mobile application
Generic threats to mobile applicationGeneric threats to mobile application
Generic threats to mobile application
Vikrant Kansal
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-PracticesOctogence
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10jpmccormack
 
10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them 10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them
Donald E. Hester
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
ghayour abbas
 
Application security (APP) and CRM or ERP extension solutions
Application security (APP) and CRM or ERP extension solutionsApplication security (APP) and CRM or ERP extension solutions
Application security (APP) and CRM or ERP extension solutions
charly simon
 

Similar to Personal Data Protection (20)

3e - Computer Crime
3e - Computer Crime3e - Computer Crime
3e - Computer Crime
 
3e - Security And Privacy
3e - Security And Privacy3e - Security And Privacy
3e - Security And Privacy
 
Module 5 security
Module 5   securityModule 5   security
Module 5 security
 
Chapter 5.pptx
Chapter 5.pptxChapter 5.pptx
Chapter 5.pptx
 
Take the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security ProtectionTake the First Steps Toward Endpoint Security Protection
Take the First Steps Toward Endpoint Security Protection
 
IS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and PrivacyIS L07 - Security, Ethics and Privacy
IS L07 - Security, Ethics and Privacy
 
Siem requirement.pdfsd
Siem requirement.pdfsdSiem requirement.pdfsd
Siem requirement.pdfsd
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)
 
Portakal Teknoloji Otc Lyon Part 1
Portakal Teknoloji Otc  Lyon Part 1Portakal Teknoloji Otc  Lyon Part 1
Portakal Teknoloji Otc Lyon Part 1
 
Data security
Data securityData security
Data security
 
5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!5 Reasons Why Your Business Should Consider Strong Authentication!
5 Reasons Why Your Business Should Consider Strong Authentication!
 
Module 6.Security in Evolving Technology
Module 6.Security in Evolving TechnologyModule 6.Security in Evolving Technology
Module 6.Security in Evolving Technology
 
Module 6.pdf
Module 6.pdfModule 6.pdf
Module 6.pdf
 
Network Security - What Every Business Needs to Know
Network Security - What Every Business Needs to KnowNetwork Security - What Every Business Needs to Know
Network Security - What Every Business Needs to Know
 
Generic threats to mobile application
Generic threats to mobile applicationGeneric threats to mobile application
Generic threats to mobile application
 
Elementary-Information-Security-Practices
Elementary-Information-Security-PracticesElementary-Information-Security-Practices
Elementary-Information-Security-Practices
 
Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10Version 3.6 Powerpoint March10
Version 3.6 Powerpoint March10
 
10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them 10 Common Security Mistakes Businesses Make and How to Avoid Them
10 Common Security Mistakes Businesses Make and How to Avoid Them
 
CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System) CSI-503 - 10. Security & Protection (Operating System)
CSI-503 - 10. Security & Protection (Operating System)
 
Application security (APP) and CRM or ERP extension solutions
Application security (APP) and CRM or ERP extension solutionsApplication security (APP) and CRM or ERP extension solutions
Application security (APP) and CRM or ERP extension solutions
 

Recently uploaded

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 

Recently uploaded (20)

Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 

Personal Data Protection

  • 2. Data Security  Data security is basically the process of keeping certain information private  It involves the use of various methods to make sure that data is kept confidential and safe  Data security ensures the integrity and the privacy of data, as well as preventing the loss or corruption of data.
  • 3. Need of Data Security  Many businesses hold very important and confidential data  Hence security of data is extremely important  Data must be safeguarded all the time
  • 4. Backups  A master file stores the static data (does not change frequently) found on the database  The transaction file keeps track of all the changes made to the database throughout the day  At the end of the day, all the contents stored in the transaction file are transferred to the master file in order to update it  This hierarchy is used for safety
  • 5. Software Safeguards  There are many software measures which can protect data.  The following explains some of the most common approaches used now a days
  • 6. IDS  IDS stands for Intrusion Detection System  IDS monitors the operation of the network to detect illegal operations  The system may be 1. server-based - detecting attacks on the operation of the file-server 2. network based, watching the pattern of traffic across the network
  • 7. User ID  User ID stands for User Identification  This is a unique name or code used to identify a specific user when gaining access (logging in).  Methods of using a user ID; 1. Passwords - words or codes known only to the user. A password is linked to a specific user ID. 2. Personal Identification Devices - a plastic card which identifies the user and acts as an electronic key. Most cards have a magnetic stripe to store information. 3. Personal Identification Numbers (PIN) - a number used as a password, particularly with bank cards and credit cards.
  • 8. Biometric  Biometric is when the human’s features are used  The individual’s biometric is measured by a special scanner and used with the user ID  Finding physical characteristics which cannot be copied has been difficult now a days we use 1. fingerprints 2. retina scans  Face and voice recognition have not be reliable
  • 9. Encryption  Encryption makes data in a computer system illegible and makes data look meaningless  Decryption is converting the illegible data back into its original form  An encryption key is a code used for the encryption process  A decryption key is needed before the data can be changed back to its original form
  • 10. Digital Signature  A digital signature makes used of encrypted data  A digital signature is encrypted data used to show that the data being sent or read is genuine  If the recipient of the data can correctly decrypt the digital signature then the data should be correct
  • 11. Digital Certificate  This is an encrypted message which confirms that the person is who they say they are  A digital certificate includes a digital signature  The certification authority, also known as a trusted service provider or a trusted third party, is a business that provides online certification facilities
  • 12. Downloading  Downloading software from the Internet is much quicker and easier than buying it and installing it. Many P2P (peer-to-peer) applications exist (such as Torrents) which facilitate the download of illegal software. Software Counterfeiting  Software Counterfeiting is when software is copied illegally and re-sold. Some counterfeited software can be very obvious because only the CD is sold, but in more “sophisticated‟ counterfeited software; everything will be reproduced including the
  • 13. Ethical Issues  When you purchase software, you do not become the owner of the copyright., you are purchasing the right to use the software under certain restrictions  Using copied or counterfeit software also means: 1. Greater exposure to software viruses, corrupt disks, or otherwise defective software 2. Inadequate or no documentation 3. No warranties 4. Lack of technical product support available to properly licensed users 5. Ineligibility for software upgrades offered to properly licensed users.  Software piracy is not a victimless crime, piracy denies the software developer its rightful profits and harms consumers and the industry as a whole  All software developers, spend years creating software.
  • 14. Legal Issues  There are also serious legal issues when in comes to software privacy  In the USA, software theft is a serious matter. If you are caught copying software, you may be held liable under both civil and criminal law  If the copyright owner brings a civil action against you, the owner can seek to stop you from using its software immediately and can also request financial payment . The copyright owner may choose between 1. Actual damages - which include the amount he/she has lost because of your violation 2. Legal damages - which can be as much as $150,000 for each program copied.  In addition, the government can criminally prosecute you for copyright infringement, you can be fined up to $250,000, or sentenced to jail for up to five years, or both!
  • 15. Software Protection  Software developers try to protect their software by using many different protection measures. 1. Serial Numbers: Certain software will ask the user to input a serial number when installing the software. If the number is not inputted the software will not install 2. Activation Keys: After the software is installed, the user is required to enter some text (the activation key) so that the application will work. This activation key is usually obtained from the seller of the application. The user will send an e-mail with the product ID of the application, and after the seller will confirm that the software is original; he/she will send the activation key which will unlock the software. 3. CD (or DVD) Copy Protection: Most companies will create a special program when burning their application to the storage medium which will prevent users from copying the software 4. Hardware Keys: In this case a hardware device (such as a USB pen) is given with the software and for the software to be functional the USB must be connected to the machine
  • 16. Software Registration  Most software is registered with the company that sells the software. The user fills in some personal details such as name, address and e-mail. This will allow the company to serve its customers better 1. Updates: The software company can inform its registered members with news about the product. This may include news about new program releases, new updates or new patches to the program 2. Bonus Features: Certain companies create bonus features to the program 3. Discounts: Registered members usually benefit from discounts on applications released by the same company. 4. Technical Support: Some companies offer technical support