Data is the very is small piece of information stored in any medium as rows and columns in our databases, personal computers or tablets and network servers. Data may be in wide range of information from person files to big secret files. Data can in forms which is may not be readable for a human being.
In a very simple terms Data Security is practice of keep data to protected from illegal theft, hacked, altered , or corrupted. The goal behind the data security is to insure the privacy of the data. Now date it is very important to be cautious on your data security because of the Internet. There are many number of way to unlock your computer from software solutions to hardware mechanism. Here are the some widely used data security techniques….
The word “encryption” comes from Greek word “Kryptos”, Which means hidden or secret. Data, Often referred as PlanText, is encrypted us an algorithm and an encryption key. Which generates a cipher text. This cipher text becomes meaning less till the decryption process done. Decryption of the cipher text can only be done by using right encryption key. Encryption algorithm’s are divided in two categories : symmetric and asymmetric
In symmetric key ciphers uses the same key for the encryption and decryption of the message or file. this technique is much more faster than asymmetric encryption, But the sender must share the encryption key with the receiver of the message to complete decryption of the message.
Asymmetric cryptography, Which also known as public key cryptography uses tow different keys as Public and private. The public key can be shared with everyone but Private Key must be keep secret.
Strong User Authentication
Strong authentication is any method of verifying the identity of a user or device that is intrinsically stringent enough to ensure the security of the system it protects by withstanding any attacks it is likely to encounter. Your computer of data center must authenticate the incoming logon request. Authentication may includes Password, One-time password, smart card event finger print.
The goal of Data Security can not be achieved without having regular backup system. You must keep a strong data backup system, because there is always a chance that your data can be compromised. You could suddenly be hit with a malware infection where a virus destroys all of your files. Use a backup software, which keeps your data copying to other location in regular interval.Tags: asymmetric key, authentication, cryptography, Data Security, encryption, symmetric key