Security and Integrity of Information-Techniques to Secure Data

By | August 20, 2020

In this blog, we will discuss Security and Integrity of Information and Techniques to Secure Data.

Techniques to Secure Data

Security and Integrity of Information

Security of Information is concerned with three core issues- Confidentiality, Integrity, and Availability of Data with the high scaling of business and Social Networks, we need to tackle the problem of integrity of information.

Financial institutions, Corporations, Military, and Private Businesses have a huge amount of confidential data that is stored in electronic devices and transmitted across networks to other computers.

In Case, there is a breach of confidentiality and important data falls into the hands of competitors, it could lead to bankruptcy of business.

Protecting private information is a business request, and many cases an ethical and legal obligation. The term integrity is used with information Security. Unauthorized to modifications to the stored data violate Integrity.

The aim of information security is to make the correct data available when needed. This means that the electronic devices(that, accept, store and process data), the security components (that protect Data), and the communication channels (that transmit Data) must function properly.

Ensuring the availability of information involves denial of service attacks means an attempt to make the computer resource unavailable to intended users.

Even our home computer is vulnerable to viruses, spyware, intruders, and malware unless we protect it using a strong security mechanism.

Techniques to Secure Data

We are going to discuss some techniques to Secure Data

1.Authentication:

An authentication Is the basis of techniques to Secure Data access control mechanisms which is essential in securing data. When an Individual Identifies herself/ himself to the security system, then identity has to verified. This is called authentication.

The Information that can be used for authentication is:

• Something you know: It may be either a password or a PIN.

• Something you have: It may refer to a magnetic swipe card ore driving licence.

  • Something you are: it refers to biometric. Biometric includes palm prints, retina scans, or fingerprints.

In today’s era of computer systems, a Username and Password are the most common forms of identification and authentication respectively. However,
in present times only this information Is not adequate.

Authorization is also required for access to the network. The administrative policies that determine what information and computing services can be accessed by whom and under what conditions.

2. Firewall:

A Firewall is one of the techniques to Secure Data software tool that protects a server, a network, or an individual computer from almost every attack by viruses and hackers. They
ire mainly used to prevent unauthorized Internet users from accessing
private networks that are connected to the Internet, mostly intranets.

all communications entering or leaving the intranet pass through a firewall. The firewall checks each message and blocks those that do not meet the security criteria.

3. Cryptography / Encryption:

This technique is used to secure data from unauthorized or accidental disclosure, while the information is in transit or storage (either electronically or physically). We implement privacy using Encryption.

Encryption is the process of transforming data into an unreadable code which is transferred over the network. On the other side , after receiving the file it goes through process called Decryption.

This process makes the unusable encrypted information readable again. The software application such as GnuPG or PGP can be used to encrypt data files and E-mail.

4. Password and PIN Numbers:

Password and PIN Numbers techniques to Secure Data because every user is given a unique password and PIN number to protect information and important data. Using these we can protect our data from unauthorised access.

5. Recovery Utility:

Recovery Utility is one of the techniques to Secure Data the physical damage hardware can be repaired using multiple techniques. Some of the damages
can be repaired by replacing damaged parts in the hard disk. This may make the disk usable again.

data recovery Techniques to Secure Data

However, to restore data from logical damage, specialized disk-imaging
utility recover every readable bit from the surface and also recover the logical file structure of storage media. After repairing the hardware, these utility plays a crucial role to recover the original data.
some of the important recovery utility is:

  • Photo Rec: A program used to recover files.
  • Recuva It’s a freeware data recovery program. it run under Microsoft Windows 10, 7,etc.
  • Adroit Photo Recovery: A photo recovery program that can recover fragmented photo files. it runs Microst OS.

6. Data Backup

Data Backup is the Techniques to Secure Data to secure data by making duplicate copies of the original data. The files may be damaged due to intended or accidental reasons. Data loss is very common, and many organizations and individuals face serious problems. Hence, regular data backup is a vital practice.
There are three techniques of data backup.

  • The online backup Systems are typically built for a client software programs that run on a given schedule. It may be a small interval, an hour, a day, or more. Such programs collect, compress, encrypt data and transfer it to the remote servers
    using the internet.
    These servers are specill;ay designed to provide backup services. The online backup systems can seen in many organizations that send a copy of fresh data to their database servers frequently. In this way, they can get a copy of importance data anytime in case of data lose.
    The Offline Backup
    system is a process which requires direct human involvemts. In this process the users themselves aatch a storage media to acomputer system and copy files. This method of copying data is called Dump.

The Backup Site need properly configured network called Data Backup servers. The location where these servers are installedare called data recovery center or Backup sites. these sites provid a copy of data during any event of diasters.

Antivirus:

In techniques to Secure Data, Antivirus software is computer programs, which identity, prevent, and remove viruses from our computer.
They are essential software which helps in securing our data while we are connected to the Internet both Online and Offline.

We should keep updating our computer with the latest versions of Antivirus programs from the Internet so that installed Antivirus software on our computer is able to detect new virus programs.
Some of the popular antivirus programs are as follows:

  • McAfee
  • AVG Antivirus
  • Quick Heal
  • Symantec Norton Antivirus
  • Microsoft Security Essentials

Now your concepts have been cleared about techniques to Secure Data. If you have any doubts and queries about the Security and Integrity of Information-Techniques to Secure Data. Please comments.

Thanks For Reading, Have a Nice Day.

You may also Read…

4 thoughts on “Security and Integrity of Information-Techniques to Secure Data

Leave a Reply

Your email address will not be published. Required fields are marked *