2_2_Data_security_measures_Presentation_3_variant_1
Оценка 4.7

2_2_Data_security_measures_Presentation_3_variant_1

Оценка 4.7
pptx
10.05.2020
2_2_Data_security_measures_Presentation_3_variant_1
2_2_Data_security_measures_Presentation_3_variant_1.pptx

What will you do if you will need to restore data on your computer?

What will you do if you will need to restore data on your computer?

What will you do if you will need to restore data on your computer?
What will you do when you buy new phone and need all old photographs, messages and contacts?

Data security measures describe security measures including the concepts: data back-up measures, encryption, mirroring

Data security measures describe security measures including the concepts: data back-up measures, encryption, mirroring

Data security measures

describe security measures including the concepts: data back-up measures, encryption, mirroring

Success criteria All learners will be able to:

Success criteria All learners will be able to:

Success criteria

All learners will be able to:
Explain what security measures currently exist
Know the differences between the mirroring and back-up of information
Do the data back-up and mirroring
Explain how data encryption works

Why is Data Security Important?

Why is Data Security Important?

Why is Data Security Important?

Data security is very important or critical for most companies and businesses. Besides formal organizations, it is also very critical for home computer users as well. Information like client details, bank details, account details, personal files, etc. must be well protected for everyone on the planet because if it gets into wrong hands, it can be misused easily. Such information can be hard to replace and potentially dangerous. By securing such data or information, one can protect the files and avoid facing any difficulties.

Different data security measures: 1

Different data security measures: 1

Different data security measures:

1. Disk Encryption.
2. Software and hardware based ways to protect data.
3. Backups.
4. Data masking.
5. Data mirroring.

Data Protection Principles Personal

Data Protection Principles Personal

Data Protection Principles

Personal Data must be processed lawfully and fairly.
Personal data should be relevant, adequate and not excessive in relation to the purpose or purposes due to which they have been processed.
Personal data must be obtained just for one or more than one specified and lawful reasons and must not be processed in any way that is not compatible with those reason/reasons.
Personal data should be accurate and should be kept up to date wherever it is necessary to keep it up to date.
Personal data which is processed for any reason or reasons should not be kept for any time longer than required for that reason or reasons.

Data encryption Disk encryption is one of the most commonly opted for data security technology or methods

Data encryption Disk encryption is one of the most commonly opted for data security technology or methods

Data encryption

Disk encryption is one of the most commonly opted for data security technology or methods. This is a technology through which encryption of data on a hard disk drive takes place. This technology takes place in two major ways – software or hardware. In disk encryption, data is converted into unreadable codes that cannot be accessed or deciphered by anyone who is unauthorized. There are several ways and tools to carry out disk encryption, and these tools may vary in the security offered and features used.

Data mirroring Discuss your definition and make an assumption which of today’s new terms best fit your definition

Data mirroring Discuss your definition and make an assumption which of today’s new terms best fit your definition

Data mirroring

Discuss your definition and make an assumption which of today’s new terms best fit your definition

Reflection What has been learned?

Reflection What has been learned?

Reflection


What has been learned?
What remained unclear?
What needs more attention?
Reflection Thermometer:
36,6 interesting, useful
38 is not interesting, hard
34 useless, priceless

Скачать файл