Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Download
Faster access than browser!
 

Data security

Index Data security

Data security means protecting digital data, such as those in a database, from destructive forces and from the unwanted actions of unauthorized users, such as a cyberattack or a data breach. [1]

52 relations: Authorization, Automated teller machine, Backup, Blogger (service), Comparison of disk encryption software, Computer security, Computer virus, Copy protection, Council of Europe, Credit card, Cyberattack, Data breach, Data corruption, Data erasure, Data masking, Data Privacy Day, Data Protection Act 1998, Data recovery, Data-centric security, Database, Debit card, Digital currency, Digital data, Digital inheritance, Disk encryption, Disk encryption hardware, Disk encryption software, General Data Protection Regulation, Hacker, Hard disk drive, Holiday, Identity-based security, Information security, IT network assurance, Malware, Multi-factor authentication, Payment Card Industry Data Security Standard, Peripheral, Personal identification number, Pre-boot authentication, Privacy engineering, Privacy law, Security breach notification laws, Security hacker, Security token, Shuman Ghosemajumder, Single sign-on, Smart card, Tokenization (data security), Trusted Computing Group, ..., United Kingdom, USB flash drive security. Expand index (2 more) »

Authorization

Authorization is the function of specifying access rights/privileges to resources related to information security and computer security in general and to access control in particular.

New!!: Data security and Authorization · See more »

Automated teller machine

An automated teller machine (ATM) is an electronic telecommunications device that enables customers of financial institutions to perform financial transactions, such as cash withdrawals, deposits, transfer funds, or obtaining account information, at any time and without the need for direct interaction with bank staff.

New!!: Data security and Automated teller machine · See more »

Backup

In information technology, a backup, or the process of backing up, refers to the copying into an archive file of computer data so it may be used to restore the original after a data loss event.

New!!: Data security and Backup · See more »

Blogger (service)

Blogger is a blog-publishing service that allows multi-user blogs with time-stamped entries.

New!!: Data security and Blogger (service) · See more »

Comparison of disk encryption software

This is a technical feature comparison of different disk encryption software.

New!!: Data security and Comparison of disk encryption software · See more »

Computer security

Cybersecurity, computer security or IT security is the protection of computer systems from theft of or damage to their hardware, software or electronic data, as well as from disruption or misdirection of the services they provide.

New!!: Data security and Computer security · See more »

Computer virus

A computer virus is a type of malicious software program ("malware") that, when executed, replicates itself by modifying other computer programs and inserting its own code.

New!!: Data security and Computer virus · See more »

Copy protection

Copy protection, also known as content protection, copy prevention and copy restriction, is any effort designed to prevent the reproduction of software, films, music, and other media, usually for copyright reasons.

New!!: Data security and Copy protection · See more »

Council of Europe

The Council of Europe (CoE; Conseil de l'Europe) is an international organisation whose stated aim is to uphold human rights, democracy and the rule of law in Europe.

New!!: Data security and Council of Europe · See more »

Credit card

A credit card is a payment card issued to users (cardholders) to enable the cardholder to pay a merchant for goods and services based on the cardholder's promise to the card issuer to pay them for the amounts so paid plus the other agreed charges.

New!!: Data security and Credit card · See more »

Cyberattack

A cyberattack is any type of offensive maneuver that targets computer information systems, infrastructures, computer networks, or personal computer devices.

New!!: Data security and Cyberattack · See more »

Data breach

A data breach is the intentional or unintentional release of secure or private/confidential information to an untrusted environment.

New!!: Data security and Data breach · See more »

Data corruption

Data corruption refers to errors in computer data that occur during writing, reading, storage, transmission, or processing, which introduce unintended changes to the original data.

New!!: Data security and Data corruption · See more »

Data erasure

Data erasure (sometimes referred to as data clearing or data wiping) is a software-based method of overwriting the data that aims to completely destroy all electronic data residing on a hard disk drive or other digital media by using zeros and ones to overwrite data onto all sectors of the device.

New!!: Data security and Data erasure · See more »

Data masking

Data masking or data obfuscation is the process of hiding original data with random characters or data.

New!!: Data security and Data masking · See more »

Data Privacy Day

Data Privacy Day (known in Europe as Data Protection Day) is an international holiday that occurs every 28 January.

New!!: Data security and Data Privacy Day · See more »

Data Protection Act 1998

The Data Protection Act 1998 was a United Kingdom Act of Parliament designed to protect personal data stored on computers or in an organised paper filing system.

New!!: Data security and Data Protection Act 1998 · See more »

Data recovery

In computing, data recovery is a process of salvaging (retrieving) inaccessible, lost, corrupted, damaged or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a normal way.

New!!: Data security and Data recovery · See more »

Data-centric security

Data-centric security is an approach to security that emphasizes the security of the data itself rather than the security of networks, servers, or applications.

New!!: Data security and Data-centric security · See more »

Database

A database is an organized collection of data, stored and accessed electronically.

New!!: Data security and Database · See more »

Debit card

A debit card (also known as a bank card, plastic card or check card) is a plastic payment card that can be used instead of cash when making purchases.

New!!: Data security and Debit card · See more »

Digital currency

Digital currency (digital money or electronic money or electronic currency) is a type of currency available only in digital form, not in physical (such as banknotes and coins).

New!!: Data security and Digital currency · See more »

Digital data

Digital data, in information theory and information systems, is the discrete, discontinuous representation of information or works.

New!!: Data security and Digital data · See more »

Digital inheritance

Digital inheritance is the process of handing over (personal) digital media in the form of digital assets and rights to (human) beneficiaries.

New!!: Data security and Digital inheritance · See more »

Disk encryption

Disk encryption is a technology which protects information by converting it into unreadable code that cannot be deciphered easily by unauthorized people.

New!!: Data security and Disk encryption · See more »

Disk encryption hardware

The computer security technique called disk encryption is used to protect confidentiality of the data stored on a computer disk.

New!!: Data security and Disk encryption hardware · See more »

Disk encryption software

Disk encryption software is computer security software that protects the confidentiality of data stored on computer media (e.g., a hard disk, floppy disk, or USB device) by using disk encryption.

New!!: Data security and Disk encryption software · See more »

General Data Protection Regulation

The General Data Protection Regulation (GDPR) (EU) 2016/679 is a regulation in EU law on data protection and privacy for all individuals within the European Union (EU) and the European Economic Area (EEA).

New!!: Data security and General Data Protection Regulation · See more »

Hacker

A computer hacker is any skilled computer expert that uses their technical knowledge to overcome a problem.

New!!: Data security and Hacker · See more »

Hard disk drive

A hard disk drive (HDD), hard disk, hard drive or fixed disk is an electromechanical data storage device that uses magnetic storage to store and retrieve digital information using one or more rigid rapidly rotating disks (platters) coated with magnetic material.

New!!: Data security and Hard disk drive · See more »

Holiday

A holiday is a day set aside by custom or by law on which normal activities, especially business or work including school, are suspended or reduced.

New!!: Data security and Holiday · See more »

Identity-based security

Identity-based security is an approach to control access to a digital product or service based on the authenticated identity of an individual.

New!!: Data security and Identity-based security · See more »

Information security

Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.

New!!: Data security and Information security · See more »

IT network assurance

IT network assurance quantifies risk from an IT network perspective, based on analysis of network facts.

New!!: Data security and IT network assurance · See more »

Malware

Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server or computer network.

New!!: Data security and Malware · See more »

Multi-factor authentication

Multi-factor authentication (MFA) is a method of confirming a user's claimed identity in which a user is granted access only after successfully presenting 2 or more pieces of evidence (or factors) to an authentication mechanism: knowledge (something they and only they know), possession (something they and only they have), and inherence (something they and only they are).

New!!: Data security and Multi-factor authentication · See more »

Payment Card Industry Data Security Standard

Ebt can pin card number 5077190291713960 The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle branded credit cards from the major card schemes.

New!!: Data security and Payment Card Industry Data Security Standard · See more »

Peripheral

A peripheral device is "an ancillary device used to put information into and get information out of the computer." Three categories of peripheral devices exist based on their relationship with the computer.

New!!: Data security and Peripheral · See more »

Personal identification number

A personal identification number (PIN, pronounced "pin"; is often spoken out loud "PIN number" by mistake) is a numeric or alpha-numeric password or code used in the process of authenticating or identifying a user to a system and system to a user.

New!!: Data security and Personal identification number · See more »

Pre-boot authentication

Pre-Boot Authentication (PBA) or Power-On Authentication (POA) serves as an extension of the BIOS or boot firmware and guarantees a secure, tamper-proof environment external to the operating system as a trusted authentication layer.

New!!: Data security and Pre-boot authentication · See more »

Privacy engineering

Privacy engineering is an emerging discipline within, at least, the software or information systems domain which aims to provide methodologies, tools and techniques such that the engineered systems provide acceptable levels of privacy.

New!!: Data security and Privacy engineering · See more »

Privacy law

Privacy law refers to the laws that deal with the regulating, storing, and using of personally identifiable information of individuals, which can be collected by governments, public or private organizations, or other individuals.

New!!: Data security and Privacy law · See more »

Security breach notification laws

Security breach notification laws or data breach notification laws are laws that require an entity that has been subject to a data breach to notify their customers and other parties about the breach and take other steps to remediate injuries caused by the breach.

New!!: Data security and Security breach notification laws · See more »

Security hacker

A security hacker is someone who seeks to breach defenses and exploit weaknesses in a computer system or network.

New!!: Data security and Security hacker · See more »

Security token

Security tokens are physical devices used to gain access to an electronically restricted resource.

New!!: Data security and Security token · See more »

Shuman Ghosemajumder

Shuman Ghosemajumder (born 1974) is a Canadian technologist, entrepreneur, and author.

New!!: Data security and Shuman Ghosemajumder · See more »

Single sign-on

Single sign-on (SSO) is a property of access control of multiple related, yet independent, software systems.

New!!: Data security and Single sign-on · See more »

Smart card

A smart card, chip card, or integrated circuit card (ICC), is any pocket-sized card that has embedded integrated circuits.

New!!: Data security and Smart card · See more »

Tokenization (data security)

Tokenization, when applied to data security, is the process of substituting a sensitive data element with a non-sensitive equivalent, referred to as a token, that has no extrinsic or exploitable meaning or value.

New!!: Data security and Tokenization (data security) · See more »

Trusted Computing Group

The Trusted Computing Group is a group formed by AMD, Hewlett-Packard, IBM, Intel and Microsoft to implement Trusted Computing concepts across personal computers.

New!!: Data security and Trusted Computing Group · See more »

United Kingdom

The United Kingdom of Great Britain and Northern Ireland, commonly known as the United Kingdom (UK) or Britain,Usage is mixed with some organisations, including the and preferring to use Britain as shorthand for Great Britain is a sovereign country in western Europe.

New!!: Data security and United Kingdom · See more »

USB flash drive security

Secure USB flash drives protect the data stored on them from access by unauthorized users.

New!!: Data security and USB flash drive security · See more »

Redirects here:

Secure information.

References

[1] https://en.wikipedia.org/wiki/Data_security

OutgoingIncoming
Hey! We are on Facebook now! »