SlideShare a Scribd company logo
1 of 6
RESEARCH THE WAYS THAT 
DATA CAN BE LOST, 
CORRUPTED OR STOLEN FROM 
BUSINESSES. 
By Rhys Thomas
 lost or damaged during a system crash - especially one affecting the 
hard disk 
 corrupted as a result of faulty disks, disk drives, or power failures 
 lost by accidentally deleting or overwriting files 
 lost or become corrupted by computer viruses 
 hacked into by unauthorised users and deleted or altered 
 destroyed by natural disasters, acts of terrorism, or war 
 deleted or altered by employees wishing to make money or take 
revenge on their employer
Cause of data 
loss 
Perception Reality 
Hardware or 
system 
problem 
78% 56% 
Human error 11% 26% 
Software 
corruption or 
problem 
7% 9% 
Computer 
viruses 
2% 4% 
Disaster 1-2% 1-2%
 Trojans 
 Worms 
 Phishing 
 Pharming 
 Spyware 
 The theft of computer components such as hard disks, USB memory 
sticks, CDs or DVDs where data is stored can lead to the loss of data.
Impacts 
One impact is you lose all your data that might be important. 
You might get fired or other things if you lose important information to do 
with your job.
WAYS TO MINIMISE THE RISKS 
Add backup files on storage units such as disks or hard drives so you will still have 
your data.

More Related Content

Viewers also liked (7)

The greenhouse effect and the enhanced greenhouse effect
The greenhouse effect and the enhanced greenhouse effectThe greenhouse effect and the enhanced greenhouse effect
The greenhouse effect and the enhanced greenhouse effect
 
Greenhouse Effect
Greenhouse EffectGreenhouse Effect
Greenhouse Effect
 
Greenhouse Effect
Greenhouse EffectGreenhouse Effect
Greenhouse Effect
 
Green house effect
Green house effectGreen house effect
Green house effect
 
Climate Change And The Enhanced Greenhouse Effect
Climate Change And The Enhanced Greenhouse EffectClimate Change And The Enhanced Greenhouse Effect
Climate Change And The Enhanced Greenhouse Effect
 
7 Enhance Greenhouse Effect
7 Enhance Greenhouse Effect7 Enhance Greenhouse Effect
7 Enhance Greenhouse Effect
 
Greenhouse Effect.
Greenhouse Effect.Greenhouse Effect.
Greenhouse Effect.
 

Similar to ways that data can be lost and how to prevent it.

Backup & Its Relevance
Backup & Its RelevanceBackup & Its Relevance
Backup & Its Relevance
Revolucion
 
Data protection
Data protectionData protection
Data protection
nity
 
CYBERdisk WORMdisk SLIDES 2016-HACK PROOF DATA
CYBERdisk  WORMdisk SLIDES  2016-HACK PROOF DATACYBERdisk  WORMdisk SLIDES  2016-HACK PROOF DATA
CYBERdisk WORMdisk SLIDES 2016-HACK PROOF DATA
Keith P. Melvey
 

Similar to ways that data can be lost and how to prevent it. (20)

Data Recovery Services in Utah
Data Recovery Services in UtahData Recovery Services in Utah
Data Recovery Services in Utah
 
Mac data recovery
Mac data recoveryMac data recovery
Mac data recovery
 
Threats to data and information security
Threats to data and information securityThreats to data and information security
Threats to data and information security
 
1 backup
1 backup1 backup
1 backup
 
Backup & Its Relevance
Backup & Its RelevanceBackup & Its Relevance
Backup & Its Relevance
 
The Importance of Business Data Backups
The Importance of Business Data BackupsThe Importance of Business Data Backups
The Importance of Business Data Backups
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5Data Backup (IT) Lecture Slide # 5
Data Backup (IT) Lecture Slide # 5
 
Database failure and recovery 1
Database failure and recovery 1Database failure and recovery 1
Database failure and recovery 1
 
Data recovery
Data recoveryData recovery
Data recovery
 
CYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptxCYBER SECURITY SEMINAR.pptx
CYBER SECURITY SEMINAR.pptx
 
Sysarcbackup
SysarcbackupSysarcbackup
Sysarcbackup
 
Data Sanitization: When, Why & How
Data Sanitization: When, Why & How Data Sanitization: When, Why & How
Data Sanitization: When, Why & How
 
12 facts about backups
12 facts about backups12 facts about backups
12 facts about backups
 
The Major 5 Reasons for Hard Disk Failure
The Major 5 Reasons for Hard Disk FailureThe Major 5 Reasons for Hard Disk Failure
The Major 5 Reasons for Hard Disk Failure
 
Data protection
Data protectionData protection
Data protection
 
DataPreserve- SEVRAR Jan 09
DataPreserve- SEVRAR Jan 09DataPreserve- SEVRAR Jan 09
DataPreserve- SEVRAR Jan 09
 
Wizard intro
Wizard introWizard intro
Wizard intro
 
Computer security
Computer securityComputer security
Computer security
 
CYBERdisk WORMdisk SLIDES 2016-HACK PROOF DATA
CYBERdisk  WORMdisk SLIDES  2016-HACK PROOF DATACYBERdisk  WORMdisk SLIDES  2016-HACK PROOF DATA
CYBERdisk WORMdisk SLIDES 2016-HACK PROOF DATA
 

Recently uploaded

Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
Muhammad Subhan
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 

Recently uploaded (20)

Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Top 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development CompaniesTop 10 CodeIgniter Development Companies
Top 10 CodeIgniter Development Companies
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdfFrisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
Frisco Automating Purchase Orders with MuleSoft IDP- May 10th, 2024.pptx.pdf
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Event-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream ProcessingEvent-Driven Architecture Masterclass: Challenges in Stream Processing
Event-Driven Architecture Masterclass: Challenges in Stream Processing
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
“Iamnobody89757” Understanding the Mysterious of Digital Identity.pdf
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
How to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in PakistanHow to Check GPS Location with a Live Tracker in Pakistan
How to Check GPS Location with a Live Tracker in Pakistan
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 

ways that data can be lost and how to prevent it.

  • 1. RESEARCH THE WAYS THAT DATA CAN BE LOST, CORRUPTED OR STOLEN FROM BUSINESSES. By Rhys Thomas
  • 2.  lost or damaged during a system crash - especially one affecting the hard disk  corrupted as a result of faulty disks, disk drives, or power failures  lost by accidentally deleting or overwriting files  lost or become corrupted by computer viruses  hacked into by unauthorised users and deleted or altered  destroyed by natural disasters, acts of terrorism, or war  deleted or altered by employees wishing to make money or take revenge on their employer
  • 3. Cause of data loss Perception Reality Hardware or system problem 78% 56% Human error 11% 26% Software corruption or problem 7% 9% Computer viruses 2% 4% Disaster 1-2% 1-2%
  • 4.  Trojans  Worms  Phishing  Pharming  Spyware  The theft of computer components such as hard disks, USB memory sticks, CDs or DVDs where data is stored can lead to the loss of data.
  • 5. Impacts One impact is you lose all your data that might be important. You might get fired or other things if you lose important information to do with your job.
  • 6. WAYS TO MINIMISE THE RISKS Add backup files on storage units such as disks or hard drives so you will still have your data.