SlideShare a Scribd company logo
1 of 12
DATA SECURITY

Data security is about keeping data safe. Many
individuals, small businesses and major
companies rely heavily on their computer
systems
KEY THREATS TO DATA
           SECURITY
Data may get:
   -lost or damaged during a system crash - especially one affecting the hard disk

   corrupted as a result of faulty disks, disk drives, or power failures

   -lost by accidentally deleting or overwriting files

   -lost or become corrupted by computer viruses

   -hacked into by unauthorized users and deleted or altered

   -destroyed by natural disasters, acts of terrorism, or war

   -deleted or altered by employees wishing to make money or take revenge on their employer
KEEPING DATA SECURE
Measures that can be taken to keep data
secure include:
 -making regular backups of files (backup copies should be stored in
 fireproof safes or in another building)

 -protecting yourself against viruses by running anti-virus software

 -using a system of passwords so that access to data is restricted

 -safe storage of important files stored on removable disks, eg locked
 away in a fireproof and waterproof safe
-allowing only authorised staff into certain computer
areas, eg by controlling entry to these areas by means of
ID cards or magnetic swipe cards
-always logging off or turning terminals off and if possible
locking them
-avoiding accidental deletion of files by write-protecting
disks
-using data encryption techniques to code data so that
itmakes no apparent sense
Data Transfer
Transfer of data files containing pictures
(graphics), text, sound, or numbers is possible
from one computer to another, one make of
hardware to another, and one application to
another. This is possible because standard file
types and data formats have been developed.
Data does not need to be transfered on physical
media, it can be transmitted at rapid speeds
around the globe.
DATA FILE TYPES
Data files are stored in a number of formats, the formats depend on which
application created the file to begin with.

For example, Microsoft Word stores files as *.doc but Adobe Photoshop stores
files in a different format - *.psd.

The file extension identifies the file's format.

When data is transferred from one computer to another, the computer
receiving the data file may not be able to read the format without the right
application installed.

For example, an image created in Adobe Photoshop and saved as a *.psd file
(Photoshop's format) would not be readable by Microsoft Paint.
TRANSLATING BETWEEN
      FILE TYPES
   Data can be stored temporarily in a computer's RAM as a means of transfer
   from one application to another. In Microsoft operating systems this feature is
   called the clipboard and it can copy data from one application and paste it into
   another. Nearly all other operating systems support this functionality.

   For example you can create a graph using a spreadsheet application and then
   use the clipboard to copy the graph to a desktop publishing application.

Limitations:

   -Certain elements of one document may not be copiable to another
   application, eg video.

   -Some file features (eg text layout and formatting) may be lost in the
   translation to a different format.
RAPID TRANSFER OF
         DATA
Files can be easily transferred and shared across the
globe using the Internet. A file could be:

emailed as an attachment

sent over instant messenger

downloaded from a website/web server

accessed over a private network
IMPORT AND EXPORT
1.Export saves the file in a format that's readable by other applications.

2.Import opens a file created in another application for viewing or
editing.

   The need to import and export data files has led to the development
   of several standard file types that many applications can
   understand.

   Examples are jpg and gif files for images, and mp3 files for sound;
   but there are also standard file types for text, movies, and
   spreadsheet data.

   Often an application of a different type can import data, for
   example, a word processor may be able to import a spreadsheet file.
XML FILES
Recently program developers have started to use the
XML web page file format as the standard way to store
data. Files can be read by any browser on any
computer, making it very easy to transfer data between
computers.
Other standard file types, such as zip and pdf (portable
document format), have been developed as ways of
distributing data in the most efficient way possible. They
do this by compressing it using zip technology or making it
possible to read using a freely available downloaded
reader application, as is the case with PDF files.
Bibliography
http://www.bbc.co.uk/schools/gcsebitesize/ict/da
tabases/6datasecurityrev1.shtml

http://www.bbc.co.uk/schools/gcsebitesize/ict/da
tabases/datatransferrev1.shtml

More Related Content

What's hot

Management information systems
Management information systemsManagement information systems
Management information systemsaz00z
 
Introduction to-microcomputers
Introduction to-microcomputersIntroduction to-microcomputers
Introduction to-microcomputersraynaldogisiri
 
L7 operating system
L7   operating systemL7   operating system
L7 operating systemheidirobison
 
Knowledge on IT Infrastructure
Knowledge on IT InfrastructureKnowledge on IT Infrastructure
Knowledge on IT InfrastructureLopamudra Das
 
PC techniques software and Hardware
PC techniques software and HardwarePC techniques software and Hardware
PC techniques software and HardwareMUSAAB HASAN
 
Implementing File Systems-R.D.Sivakumar
Implementing File Systems-R.D.SivakumarImplementing File Systems-R.D.Sivakumar
Implementing File Systems-R.D.SivakumarSivakumar R D .
 
Computers and more
Computers and moreComputers and more
Computers and moreEli Jimenez
 
Database Management System users
Database Management System usersDatabase Management System users
Database Management System usersRaj vardhan
 
could computing back story
could computing back storycould computing back story
could computing back storyansar ahmed
 
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1Raj vardhan
 
Information technology
Information technologyInformation technology
Information technologyBadar Rizwan
 
Teaching systems and fundamentals
Teaching systems and fundamentalsTeaching systems and fundamentals
Teaching systems and fundamentalsHouston ISD
 

What's hot (19)

Management information systems
Management information systemsManagement information systems
Management information systems
 
Files Management
Files ManagementFiles Management
Files Management
 
Introduction to-microcomputers
Introduction to-microcomputersIntroduction to-microcomputers
Introduction to-microcomputers
 
Storage devices
Storage devicesStorage devices
Storage devices
 
B.Sc. II (IV Sem) RDBMS & PL/SQL Unit-1 Fundamentals of DBMS
B.Sc. II (IV Sem) RDBMS & PL/SQL Unit-1 Fundamentals of DBMSB.Sc. II (IV Sem) RDBMS & PL/SQL Unit-1 Fundamentals of DBMS
B.Sc. II (IV Sem) RDBMS & PL/SQL Unit-1 Fundamentals of DBMS
 
L7 operating system
L7   operating systemL7   operating system
L7 operating system
 
Knowledge on IT Infrastructure
Knowledge on IT InfrastructureKnowledge on IT Infrastructure
Knowledge on IT Infrastructure
 
Database History
Database HistoryDatabase History
Database History
 
Microprocressers
Microprocressers Microprocressers
Microprocressers
 
PC techniques software and Hardware
PC techniques software and HardwarePC techniques software and Hardware
PC techniques software and Hardware
 
C) ICT Application
C) ICT ApplicationC) ICT Application
C) ICT Application
 
Implementing File Systems-R.D.Sivakumar
Implementing File Systems-R.D.SivakumarImplementing File Systems-R.D.Sivakumar
Implementing File Systems-R.D.Sivakumar
 
Computers and more
Computers and moreComputers and more
Computers and more
 
Database Management System users
Database Management System usersDatabase Management System users
Database Management System users
 
could computing back story
could computing back storycould computing back story
could computing back story
 
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
DATABASE MANAGEMENT SYSTEM UNIT-I Chapter-1
 
Information technology
Information technologyInformation technology
Information technology
 
Teaching systems and fundamentals
Teaching systems and fundamentalsTeaching systems and fundamentals
Teaching systems and fundamentals
 
Database & Database Users
Database & Database UsersDatabase & Database Users
Database & Database Users
 

Viewers also liked

Ефективне блоговедення на ГУРТі
Ефективне блоговедення на ГУРТіЕфективне блоговедення на ГУРТі
Ефективне блоговедення на ГУРТіJmenka Kravchenko
 
Caribstudiesmodule1notes
Caribstudiesmodule1notes Caribstudiesmodule1notes
Caribstudiesmodule1notes Carlton Corke
 
Ttristany an isolda!
Ttristany an isolda!Ttristany an isolda!
Ttristany an isolda!carlaserrat
 
Ttristany an isolda!
Ttristany an isolda!Ttristany an isolda!
Ttristany an isolda!carlaserrat
 
Perspectives on Innovation and Technology Transfer
Perspectives on Innovation and Technology TransferPerspectives on Innovation and Technology Transfer
Perspectives on Innovation and Technology TransferMikus Dubickis
 
First Niagara Targets May 18th For Completion Of Hsbc Branch Acquisition R2 ...
First Niagara Targets May 18th For Completion Of Hsbc Branch Acquisition  R2 ...First Niagara Targets May 18th For Completion Of Hsbc Branch Acquisition  R2 ...
First Niagara Targets May 18th For Completion Of Hsbc Branch Acquisition R2 ...dhineser
 
Kkm kls x ok semester 1
Kkm kls x ok semester 1Kkm kls x ok semester 1
Kkm kls x ok semester 1liza1207
 
Ефективне блоговедення на ГУРТі
Ефективне блоговедення на ГУРТіЕфективне блоговедення на ГУРТі
Ефективне блоговедення на ГУРТіJmenka Kravchenko
 
lembar soal obyektif
lembar soal obyektiflembar soal obyektif
lembar soal obyektifliza1207
 
Affordable Relationship Counseling (http://www.Cunninghamtherapy.com): Bowen ...
Affordable Relationship Counseling (http://www.Cunninghamtherapy.com): Bowen ...Affordable Relationship Counseling (http://www.Cunninghamtherapy.com): Bowen ...
Affordable Relationship Counseling (http://www.Cunninghamtherapy.com): Bowen ...Barbara Cunningham, Psy.D., MFT
 
Bowen Family Systems: Model of Practice at www.Cunninghamtherapy.com
Bowen Family Systems: Model of Practice at www.Cunninghamtherapy.comBowen Family Systems: Model of Practice at www.Cunninghamtherapy.com
Bowen Family Systems: Model of Practice at www.Cunninghamtherapy.comBarbara Cunningham, Psy.D., MFT
 

Viewers also liked (17)

Data security
Data securityData security
Data security
 
Ефективне блоговедення на ГУРТі
Ефективне блоговедення на ГУРТіЕфективне блоговедення на ГУРТі
Ефективне блоговедення на ГУРТі
 
LicenseFs 4
LicenseFs 4LicenseFs 4
LicenseFs 4
 
Caribstudiesmodule1notes
Caribstudiesmodule1notes Caribstudiesmodule1notes
Caribstudiesmodule1notes
 
Ttristany an isolda!
Ttristany an isolda!Ttristany an isolda!
Ttristany an isolda!
 
Ttristany an isolda!
Ttristany an isolda!Ttristany an isolda!
Ttristany an isolda!
 
Perspectives on Innovation and Technology Transfer
Perspectives on Innovation and Technology TransferPerspectives on Innovation and Technology Transfer
Perspectives on Innovation and Technology Transfer
 
First Niagara Targets May 18th For Completion Of Hsbc Branch Acquisition R2 ...
First Niagara Targets May 18th For Completion Of Hsbc Branch Acquisition  R2 ...First Niagara Targets May 18th For Completion Of Hsbc Branch Acquisition  R2 ...
First Niagara Targets May 18th For Completion Of Hsbc Branch Acquisition R2 ...
 
Kkm kls x ok semester 1
Kkm kls x ok semester 1Kkm kls x ok semester 1
Kkm kls x ok semester 1
 
Hovorukhina
HovorukhinaHovorukhina
Hovorukhina
 
Prогон
PrогонPrогон
Prогон
 
Ефективне блоговедення на ГУРТі
Ефективне блоговедення на ГУРТіЕфективне блоговедення на ГУРТі
Ефективне блоговедення на ГУРТі
 
Fentanyl& california's physician diversion program
Fentanyl& california's physician diversion programFentanyl& california's physician diversion program
Fentanyl& california's physician diversion program
 
Fentanyl and california's physician diversion program
Fentanyl and california's physician diversion programFentanyl and california's physician diversion program
Fentanyl and california's physician diversion program
 
lembar soal obyektif
lembar soal obyektiflembar soal obyektif
lembar soal obyektif
 
Affordable Relationship Counseling (http://www.Cunninghamtherapy.com): Bowen ...
Affordable Relationship Counseling (http://www.Cunninghamtherapy.com): Bowen ...Affordable Relationship Counseling (http://www.Cunninghamtherapy.com): Bowen ...
Affordable Relationship Counseling (http://www.Cunninghamtherapy.com): Bowen ...
 
Bowen Family Systems: Model of Practice at www.Cunninghamtherapy.com
Bowen Family Systems: Model of Practice at www.Cunninghamtherapy.comBowen Family Systems: Model of Practice at www.Cunninghamtherapy.com
Bowen Family Systems: Model of Practice at www.Cunninghamtherapy.com
 

Similar to Data security and Data Transfer

Storage Made Easy - M-Stream File Transfer Acceleration
Storage Made Easy - M-Stream File Transfer AccelerationStorage Made Easy - M-Stream File Transfer Acceleration
Storage Made Easy - M-Stream File Transfer AccelerationHybrid Cloud
 
StoreGrid : Introduction & Features
StoreGrid : Introduction & FeaturesStoreGrid : Introduction & Features
StoreGrid : Introduction & FeaturesRevolucion
 
Input ,Output & Storage Devices
Input ,Output & Storage DevicesInput ,Output & Storage Devices
Input ,Output & Storage DevicesAshirwadPandey1
 
M-Stream® File Transfer Acceleration | Solution Brief
M-Stream® File Transfer Acceleration | Solution BriefM-Stream® File Transfer Acceleration | Solution Brief
M-Stream® File Transfer Acceleration | Solution BriefHybrid Cloud
 
File extensions
File extensionsFile extensions
File extensionsJLPolking
 
Meyer poster draft
Meyer poster draftMeyer poster draft
Meyer poster draftScott
 
Computer and its application
Computer and its applicationComputer and its application
Computer and its applicationABUL HASAN
 
Android File Management Presentation.pptx
Android File Management Presentation.pptxAndroid File Management Presentation.pptx
Android File Management Presentation.pptxvuqaxuly
 
Android File Management Presentation.pptx
Android File Management Presentation.pptxAndroid File Management Presentation.pptx
Android File Management Presentation.pptxvuqaxuly
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementBlackBerry
 
MIS Management Information Systems
MIS Management Information SystemsMIS Management Information Systems
MIS Management Information SystemsThomas Mon
 
System software 1
System software 1System software 1
System software 1fatinsmile
 

Similar to Data security and Data Transfer (20)

DLP and MDM Datasheet
DLP and MDM DatasheetDLP and MDM Datasheet
DLP and MDM Datasheet
 
Storage Made Easy - M-Stream File Transfer Acceleration
Storage Made Easy - M-Stream File Transfer AccelerationStorage Made Easy - M-Stream File Transfer Acceleration
Storage Made Easy - M-Stream File Transfer Acceleration
 
StoreGrid : Introduction & Features
StoreGrid : Introduction & FeaturesStoreGrid : Introduction & Features
StoreGrid : Introduction & Features
 
MSCIT Unit 1
MSCIT Unit 1MSCIT Unit 1
MSCIT Unit 1
 
Downloading Steps
Downloading StepsDownloading Steps
Downloading Steps
 
Input ,Output & Storage Devices
Input ,Output & Storage DevicesInput ,Output & Storage Devices
Input ,Output & Storage Devices
 
M-Stream® File Transfer Acceleration | Solution Brief
M-Stream® File Transfer Acceleration | Solution BriefM-Stream® File Transfer Acceleration | Solution Brief
M-Stream® File Transfer Acceleration | Solution Brief
 
File management.pptx
File management.pptxFile management.pptx
File management.pptx
 
File extensions
File extensionsFile extensions
File extensions
 
Meyer poster draft
Meyer poster draftMeyer poster draft
Meyer poster draft
 
RAM_Application.pdf
RAM_Application.pdfRAM_Application.pdf
RAM_Application.pdf
 
Computer and its application
Computer and its applicationComputer and its application
Computer and its application
 
Android File Management Presentation.pptx
Android File Management Presentation.pptxAndroid File Management Presentation.pptx
Android File Management Presentation.pptx
 
Android File Management Presentation.pptx
Android File Management Presentation.pptxAndroid File Management Presentation.pptx
Android File Management Presentation.pptx
 
Secure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content ManagementSecure Enterprise File Sharing and Mobile Content Management
Secure Enterprise File Sharing and Mobile Content Management
 
Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
Computer application
Computer applicationComputer application
Computer application
 
MIS Management Information Systems
MIS Management Information SystemsMIS Management Information Systems
MIS Management Information Systems
 
Cloud docu ppt
Cloud docu pptCloud docu ppt
Cloud docu ppt
 
System software 1
System software 1System software 1
System software 1
 

Recently uploaded

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Data security and Data Transfer

  • 1.
  • 2. DATA SECURITY Data security is about keeping data safe. Many individuals, small businesses and major companies rely heavily on their computer systems
  • 3. KEY THREATS TO DATA SECURITY Data may get: -lost or damaged during a system crash - especially one affecting the hard disk corrupted as a result of faulty disks, disk drives, or power failures -lost by accidentally deleting or overwriting files -lost or become corrupted by computer viruses -hacked into by unauthorized users and deleted or altered -destroyed by natural disasters, acts of terrorism, or war -deleted or altered by employees wishing to make money or take revenge on their employer
  • 4. KEEPING DATA SECURE Measures that can be taken to keep data secure include: -making regular backups of files (backup copies should be stored in fireproof safes or in another building) -protecting yourself against viruses by running anti-virus software -using a system of passwords so that access to data is restricted -safe storage of important files stored on removable disks, eg locked away in a fireproof and waterproof safe
  • 5. -allowing only authorised staff into certain computer areas, eg by controlling entry to these areas by means of ID cards or magnetic swipe cards -always logging off or turning terminals off and if possible locking them -avoiding accidental deletion of files by write-protecting disks -using data encryption techniques to code data so that itmakes no apparent sense
  • 6. Data Transfer Transfer of data files containing pictures (graphics), text, sound, or numbers is possible from one computer to another, one make of hardware to another, and one application to another. This is possible because standard file types and data formats have been developed. Data does not need to be transfered on physical media, it can be transmitted at rapid speeds around the globe.
  • 7. DATA FILE TYPES Data files are stored in a number of formats, the formats depend on which application created the file to begin with. For example, Microsoft Word stores files as *.doc but Adobe Photoshop stores files in a different format - *.psd. The file extension identifies the file's format. When data is transferred from one computer to another, the computer receiving the data file may not be able to read the format without the right application installed. For example, an image created in Adobe Photoshop and saved as a *.psd file (Photoshop's format) would not be readable by Microsoft Paint.
  • 8. TRANSLATING BETWEEN FILE TYPES Data can be stored temporarily in a computer's RAM as a means of transfer from one application to another. In Microsoft operating systems this feature is called the clipboard and it can copy data from one application and paste it into another. Nearly all other operating systems support this functionality. For example you can create a graph using a spreadsheet application and then use the clipboard to copy the graph to a desktop publishing application. Limitations: -Certain elements of one document may not be copiable to another application, eg video. -Some file features (eg text layout and formatting) may be lost in the translation to a different format.
  • 9. RAPID TRANSFER OF DATA Files can be easily transferred and shared across the globe using the Internet. A file could be: emailed as an attachment sent over instant messenger downloaded from a website/web server accessed over a private network
  • 10. IMPORT AND EXPORT 1.Export saves the file in a format that's readable by other applications. 2.Import opens a file created in another application for viewing or editing. The need to import and export data files has led to the development of several standard file types that many applications can understand. Examples are jpg and gif files for images, and mp3 files for sound; but there are also standard file types for text, movies, and spreadsheet data. Often an application of a different type can import data, for example, a word processor may be able to import a spreadsheet file.
  • 11. XML FILES Recently program developers have started to use the XML web page file format as the standard way to store data. Files can be read by any browser on any computer, making it very easy to transfer data between computers. Other standard file types, such as zip and pdf (portable document format), have been developed as ways of distributing data in the most efficient way possible. They do this by compressing it using zip technology or making it possible to read using a freely available downloaded reader application, as is the case with PDF files.