SlideShare a Scribd company logo
1 of 6
BACKUP: Copying/storing files onto a secondary storage device
RECOVERY: Retrieving data from backup or restoring data
The need for backups arise when threats such as viruses, data corruption, theft,
hardware/software failure and unreasonable data compromise data.
Therefore regular backups are required.
Backup schemes:
• Full: all files are copied
• Partial: only those that have been newly created or changed are copied
• Incremental Partial: copies files changed since last partial
• Differential Partial: copies files changed since last full
Use of Physical
Locks operated by:
Keycard
Biometric Identifiers
(fingerprints)
Passwords
Physical Keys

Climate control
keeps conditions
constant to prevent
damage to hardware

Government data
warehouses would
be in deep bomb
proof bunkers with
armed guards
Password: Confidential set of characters that grant access to secure data
Passwords are useful for multi user systems where people who may not have authorization to view particular
parts of the system, can be barred from viewing that confidential data as they do not have clearance in the
form of the password.

Encryption: scrambling data to the point where it is unreadable so that those without the key (the procedure to
decode the encrypted data) to decrypt it may not access the data without authorization
Decryption: decoding the data using a key

Encryption can be Symmetrical (1 key) or Asymmetrical (2 Keys) with the latter being more secure.
DBMS View: restricted portions of a database are made available to VIEW only, often it is the output of a
SELECT Query
Often views are used so that data from a DB could be opened by other software applications

Record Locks: locking databases from editing
Pessimistic Locking: first user to edit the record locks the DB and so proceeding users must wait for the first user
to update it before they have a chance to edit it themselves
Optimistic Locking: first user edits the record but the 2 nd user can edit the record and must decide whether to
overwrite or delete their own changes

More Related Content

Similar to Hsc ipt securing data

Securing data
Securing dataSecuring data
Securing data
Daniel Le
 
MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptx
missionsk81
 
SQL Server Encryption - Adi Cohn
SQL Server Encryption - Adi CohnSQL Server Encryption - Adi Cohn
SQL Server Encryption - Adi Cohn
sqlserver.co.il
 
Database Security Management
Database Security Management Database Security Management
Database Security Management
Ahsin Yousaf
 
Database managementsystemes_Unit-7.pptxe
Database managementsystemes_Unit-7.pptxeDatabase managementsystemes_Unit-7.pptxe
Database managementsystemes_Unit-7.pptxe
chnrketan
 

Similar to Hsc ipt securing data (20)

Task 1 - Securing Data
Task 1 - Securing DataTask 1 - Securing Data
Task 1 - Securing Data
 
Securing data
Securing dataSecuring data
Securing data
 
Securing data
Securing dataSecuring data
Securing data
 
Database security
Database securityDatabase security
Database security
 
Encryption technology
Encryption technologyEncryption technology
Encryption technology
 
Paper2
Paper2Paper2
Paper2
 
databasesecurit-phpapp01.pdf
databasesecurit-phpapp01.pdfdatabasesecurit-phpapp01.pdf
databasesecurit-phpapp01.pdf
 
Securing data at rest with encryption
Securing data at rest with encryptionSecuring data at rest with encryption
Securing data at rest with encryption
 
Database security
Database securityDatabase security
Database security
 
Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...Decentralized access control with authentication anonymous of data stored in ...
Decentralized access control with authentication anonymous of data stored in ...
 
MobileDBSecurity.pptx
MobileDBSecurity.pptxMobileDBSecurity.pptx
MobileDBSecurity.pptx
 
uu (2).pdf
uu (2).pdfuu (2).pdf
uu (2).pdf
 
Hard Disk Encryptions
Hard Disk EncryptionsHard Disk Encryptions
Hard Disk Encryptions
 
SQL Server Encryption - Adi Cohn
SQL Server Encryption - Adi CohnSQL Server Encryption - Adi Cohn
SQL Server Encryption - Adi Cohn
 
Data encryption in database management system
Data encryption in database management systemData encryption in database management system
Data encryption in database management system
 
Securing Open Source Databases
Securing Open Source DatabasesSecuring Open Source Databases
Securing Open Source Databases
 
Database security technique with database cache
Database security technique with database cacheDatabase security technique with database cache
Database security technique with database cache
 
Database backup & recovery
Database backup & recoveryDatabase backup & recovery
Database backup & recovery
 
Database Security Management
Database Security Management Database Security Management
Database Security Management
 
Database managementsystemes_Unit-7.pptxe
Database managementsystemes_Unit-7.pptxeDatabase managementsystemes_Unit-7.pptxe
Database managementsystemes_Unit-7.pptxe
 

Recently uploaded

Recently uploaded (20)

Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

Hsc ipt securing data

  • 1.
  • 2.
  • 3. BACKUP: Copying/storing files onto a secondary storage device RECOVERY: Retrieving data from backup or restoring data The need for backups arise when threats such as viruses, data corruption, theft, hardware/software failure and unreasonable data compromise data. Therefore regular backups are required. Backup schemes: • Full: all files are copied • Partial: only those that have been newly created or changed are copied • Incremental Partial: copies files changed since last partial • Differential Partial: copies files changed since last full
  • 4. Use of Physical Locks operated by: Keycard Biometric Identifiers (fingerprints) Passwords Physical Keys Climate control keeps conditions constant to prevent damage to hardware Government data warehouses would be in deep bomb proof bunkers with armed guards
  • 5. Password: Confidential set of characters that grant access to secure data Passwords are useful for multi user systems where people who may not have authorization to view particular parts of the system, can be barred from viewing that confidential data as they do not have clearance in the form of the password. Encryption: scrambling data to the point where it is unreadable so that those without the key (the procedure to decode the encrypted data) to decrypt it may not access the data without authorization Decryption: decoding the data using a key Encryption can be Symmetrical (1 key) or Asymmetrical (2 Keys) with the latter being more secure.
  • 6. DBMS View: restricted portions of a database are made available to VIEW only, often it is the output of a SELECT Query Often views are used so that data from a DB could be opened by other software applications Record Locks: locking databases from editing Pessimistic Locking: first user to edit the record locks the DB and so proceeding users must wait for the first user to update it before they have a chance to edit it themselves Optimistic Locking: first user edits the record but the 2 nd user can edit the record and must decide whether to overwrite or delete their own changes