16

2 Different Threats to Data Security - Solutions to Security Threats

Security Threats
Threat is defined as computer program, a person, or an event that violates (or breaks) the security system. A threat causes loss of data and attacks the data privacy. There are different threats to data security. The main threats to data security are as follows:
  1. Unintentional Threat
  2. Intentional Threat
1- Unintentional Threat
    The word 'unintentional' means 'by mistake or by chance'. The authorized user may delete sensitive data by mistake or accidentally. The data may also be corrupted or deleted due to:
  • technical failure of hardware
  • sudden breakdown of electric supply
  • failure of some program running on the computer
  • viruses etc.
Solutions
There are following solutions for unintentional threat:
  • Backup: Backup of data should be taken regularly. The backup of data can be used to recover the deleted data.
  • Antivirus: Latest antivirus software should be used to scan all data coming into the computer.
2- Intentional Threat
    The word 'intentional' means 'planned or with purpose'. The unauthorized (or authorized) user may delete sensitive data intentionally. The user may be an angry employee of an organization or any other unauthorized person. Usually, hackers can delete the sensitive data. A hacker is a person who is technically a computer expert. He breaks security of the computer system for deleting or modifying data. He gets access to data through computer network using computer software or tools or other techniques.

Solutions
There are following solutions for intentional threat:
  • Users Rights: The users must be assigned proper rights to minimize the intentional threats. Only the authorized users that have rights to access data may be allowed to delete or modify data after following a step-by-step process.
  • Password: A proper password protection should be used. A log file should also be maintained to keep track of all the activities performed on the data/files. Authorized users should change their passwords periodically. Very short passwords should be avoided.
  • Encryption: Some strong encryption algorithm should be used. Data encryption is a technique in which sensitive data is encoded before its storage or transmission over a network. If any one (unauthorized person) gets access to the data, he may not be able to understand it.
  • Place Computer & Data in Locked Room: Computers and all backing storage devices should be placed in locked rooms. Only authorized users should access these resources.

16 Responses to “2 Different Threats to Data Security - Solutions to Security Threats”

Muhammad Usman said...
11 December 2013 at 20:57

This is really informative post. Hope you will share more posts in future!
Tip to protect your Source code!
Protect Your Source Code


Great Info said...
1 February 2014 at 00:58

Thanks to all of you for compliment. We had stopped working to under any compulsion. Now we'll try our best to better than before and in easy words.


Ratings and reviews SA said...
17 February 2014 at 21:35

This post is the reveal of extraordinary ideas and thoughts . Congrats for releasing such a nice post.This is nice post. I was awaiting for such an article and I have gained some very useful information from this site.I admire the valuable information you offer in your articles. I will bookmark your blog and have my friends check up here often. I am quite sure they will learn lots of new stuff here than anybody else.


Great Info said...
21 February 2014 at 11:35

Thanks to you for compliment. We'll try our best to better than before and in easy words. :)


Amber Salm said...
14 March 2014 at 01:47

The information is really helpful. The best thing which I liked in this article is that you have posted the appropriate solution with respect to each threat. Thank you for this great share.
electronic signature software


waqas kaifi said...
3 July 2014 at 02:04

hi brother great yur blog


Mary Gooven said...
12 April 2016 at 23:39

I also can recommend you to try ideals virtual data rooms/ If you are looking for good service for data security it will help you!


jaspreet singh said...
16 April 2016 at 02:57

have you heard about http://www.hamrecycling.com/, click highlighted text to know more.


VegaDigital SystemsDubai said...
12 June 2016 at 09:52

Really a nice blog...keep updating us. Just want to inform : We are one of the leading Security system companies in dubai. Just want to introduced our-self.


john mike said...
26 July 2016 at 02:23

Cloud Ace Technologies is offering Implementation Services on Cloud Computing, Cloud Services, IT Security and adobe dealers in chennai


john mike said...
26 July 2016 at 02:30

Cloud Ace Technologies is offering Implementation Services on Cloud Computing, Cloud Services, IT Security and adobe dealers in chennai


Zepharia Andres said...
11 August 2016 at 01:52

Human nature is evil, and goodness is caused by intentional
activity. See the link below for more info.

#intentional
www.ufgop.org


john mike said...
22 August 2016 at 00:38

Cloud Ace Technologies is offering Implementation Services on Cloud Computing, Cloud Services, IT Security, Storage solutions
adobe dealers in chennai


Inzinc Consulting India said...
17 September 2016 at 02:24

Very informative and useful blog.
ISO 27001 Consultants in India and ISO 27001 Consultants in Bangalore


john mike said...
21 October 2016 at 05:32

Cloudace is the market leader in offering Web Application security and Firewall Solutions in cost effective manner in Vijayawada and Hyderabad cities India
solution/web-application-security-and-firewall-solutions/


john mike said...
14 November 2016 at 01:30

Cloud Ace Technologies is offering Implementation Services on Cloud Computing, Cloud Services, IT Security, Storage solutions
IT Security Solutions


Post a Comment