Want to create interactive content? It’s easy in Genially!

Get started free

TRÍPTICO CORPORATIVO

David Papa

Created on April 6, 2022

kj

Start designing with a free template

Discover more than 1500 professional designs like these:

Transcript

Data Protection/ Securtiy

Difference between Data Privacy/ Data Security:

Cybersecurity

Data protection is very different from data security. Security is designed to thwart a malicious attack against an organization's data and other IT resources, whereas data protection is designed to ensure data can be restored if necessary. Data protection is important, since it prevents the information of an organization from fraudulent activities, hacking, phishing, and identity theft.

When it comes to cybersecurity (i.e. computer, digital), we can agree that it refers to protective measures that we put in place to protect our digital assets from harmful events such as human and technical errors, malicious individuals, and unauthorized users.

Cyber security or IT security is the protection of networks, computer systems, cyber-physical systems and robots from theft or damage to their hardware and software or the data they process, as well as from interruption or misuse of the services and functions offered.

3 principles of information security:
Information Security
Data security

Information security is used to provide protection for important informations from unauthorized access, theft or manipulation that threaten it. It also brovids the necessary tools and means to protect the informations from internal or external risks or attacks.

Data security is the process of protecting sensitive data from unauthorized access and corruption throughout its lifecycle.

Examples of Data Security Technology:

Examples:
  • Authentication
  • Multi-Factor Authentication
  • Access control
  • Data Encryption
  • Email Security
  • Tokenization

Passwords, network and host-based firewalls, network intrusion detection systems, access control lists, and data encryption are examples of logical controls.

  • Confidentiality: This means ensuring that only the authorized users have access to information.
  • Integrity: To protect information from being modified by unauthorized people and ensures that the information is trustworthy and accurate.
  • Availability: To ensure that the information is accessible to authorized people whenever it is needed.